Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-40909 (GCVE-0-2025-40909)
Vulnerability from cvelistv5
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-03T18:09:27.894Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2025/05/23/1"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/05/30/4"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/06/02/2"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/06/02/5"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/06/02/6"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/06/02/7"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/1"
},
{
"url": "http://seclists.org/fulldisclosure/2025/Sep/55"
},
{
"url": "http://seclists.org/fulldisclosure/2025/Sep/54"
},
{
"url": "http://seclists.org/fulldisclosure/2025/Sep/53"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-40909",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-30T14:05:00.839656Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-30T14:09:50.842Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://cpan.org/modules",
"defaultStatus": "unaffected",
"packageName": "perl",
"product": "perl",
"programRoutines": [
{
"name": "threads"
}
],
"repo": "https://github.com/perl/perl5",
"vendor": "perl",
"versions": [
{
"lessThan": "5.41.13",
"status": "affected",
"version": "5.13.6",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Vincent Lefevre"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Perl threads have a working directory race condition where file operations may target unintended paths.\u003cbr\u003e\u003cbr\u003eIf a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone\u0026nbsp;that handle for the new thread, which is visible from any third (or\u0026nbsp;more) thread already running. \u003cbr\u003e\u003cbr\u003eThis may lead to unintended operations\u0026nbsp;such as loading code or accessing files from unexpected locations,\u0026nbsp;which a local attacker may be able to exploit.\u003cbr\u003e\u003cbr\u003eThe bug was introduced in commit\u0026nbsp;11a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6"
}
],
"value": "Perl threads have a working directory race condition where file operations may target unintended paths.\n\nIf a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone\u00a0that handle for the new thread, which is visible from any third (or\u00a0more) thread already running. \n\nThis may lead to unintended operations\u00a0such as loading code or accessing files from unexpected locations,\u00a0which a local attacker may be able to exploit.\n\nThe bug was introduced in commit\u00a011a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-689",
"description": "CWE-689 Permission Race Condition During Resource Copy",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-426",
"description": "CWE-426 Untrusted Search Path",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-05T13:24:00.827Z",
"orgId": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"shortName": "CPANSec"
},
"references": [
{
"tags": [
"patch"
],
"url": "https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch"
},
{
"tags": [
"mailing-list",
"exploit"
],
"url": "https://www.openwall.com/lists/oss-security/2025/05/22/2"
},
{
"tags": [
"issue-tracking"
],
"url": "https://github.com/Perl/perl5/issues/23010"
},
{
"tags": [
"related"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226"
},
{
"tags": [
"related"
],
"url": "https://github.com/Perl/perl5/issues/10387"
},
{
"tags": [
"related"
],
"url": "https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads"
},
{
"tags": [
"related"
],
"url": "https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update perl to an unaffected version, or apply the patch provided in the references section."
}
],
"value": "Update perl to an unaffected version, or apply the patch provided in the references section."
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Perl threads have a working directory race condition where file operations may target unintended paths",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"assignerShortName": "CPANSec",
"cveId": "CVE-2025-40909",
"datePublished": "2025-05-30T12:20:11.237Z",
"dateReserved": "2025-04-16T09:05:34.360Z",
"dateUpdated": "2025-11-03T18:09:27.894Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-40909\",\"sourceIdentifier\":\"9b29abf9-4ab0-4765-b253-1875cd9b441e\",\"published\":\"2025-05-30T13:15:22.350\",\"lastModified\":\"2025-11-03T19:15:52.563\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Perl threads have a working directory race condition where file operations may target unintended paths.\\n\\nIf a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone\u00a0that handle for the new thread, which is visible from any third (or\u00a0more) thread already running. \\n\\nThis may lead to unintended operations\u00a0such as loading code or accessing files from unexpected locations,\u00a0which a local attacker may be able to exploit.\\n\\nThe bug was introduced in commit\u00a011a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6\"},{\"lang\":\"es\",\"value\":\"Los subprocesos de Perl tienen una condici\u00f3n de ejecuci\u00f3n en el directorio de trabajo donde las operaciones con archivos pueden dirigirse a rutas no deseadas. Si un identificador de directorio est\u00e1 abierto al crear el subproceso, el directorio de trabajo actual de todo el proceso se modifica temporalmente para clonar dicho identificador para el nuevo subproceso, visible desde cualquier tercer subproceso (o m\u00e1s) en ejecuci\u00f3n. Esto puede provocar operaciones no deseadas, como la carga de c\u00f3digo o el acceso a archivos desde ubicaciones inesperadas, que un atacante local podr\u00eda explotar. El error se introdujo en el commit 11a11ecf4bea72b17d250cfb43c897be1341861e y se public\u00f3 en la versi\u00f3n 5.13.6 de Perl.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.5,\"impactScore\":3.4}]},\"weaknesses\":[{\"source\":\"9b29abf9-4ab0-4765-b253-1875cd9b441e\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-426\"},{\"lang\":\"en\",\"value\":\"CWE-689\"}]}],\"references\":[{\"url\":\"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226\",\"source\":\"9b29abf9-4ab0-4765-b253-1875cd9b441e\"},{\"url\":\"https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e\",\"source\":\"9b29abf9-4ab0-4765-b253-1875cd9b441e\"},{\"url\":\"https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch\",\"source\":\"9b29abf9-4ab0-4765-b253-1875cd9b441e\"},{\"url\":\"https://github.com/Perl/perl5/issues/10387\",\"source\":\"9b29abf9-4ab0-4765-b253-1875cd9b441e\"},{\"url\":\"https://github.com/Perl/perl5/issues/23010\",\"source\":\"9b29abf9-4ab0-4765-b253-1875cd9b441e\"},{\"url\":\"https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads\",\"source\":\"9b29abf9-4ab0-4765-b253-1875cd9b441e\"},{\"url\":\"https://www.openwall.com/lists/oss-security/2025/05/22/2\",\"source\":\"9b29abf9-4ab0-4765-b253-1875cd9b441e\"},{\"url\":\"http://seclists.org/fulldisclosure/2025/Sep/53\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2025/Sep/54\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://seclists.org/fulldisclosure/2025/Sep/55\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/05/23/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/05/30/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/06/02/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/06/02/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/06/02/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/06/02/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/06/03/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2025/05/23/1\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/05/30/4\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/06/02/2\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/06/02/5\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/06/02/6\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/06/02/7\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/06/03/1\"}, {\"url\": \"http://seclists.org/fulldisclosure/2025/Sep/55\"}, {\"url\": \"http://seclists.org/fulldisclosure/2025/Sep/54\"}, {\"url\": \"http://seclists.org/fulldisclosure/2025/Sep/53\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-03T18:09:27.894Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.9, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-40909\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-30T14:05:00.839656Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-30T14:09:40.567Z\"}}], \"cna\": {\"title\": \"Perl threads have a working directory race condition where file operations may target unintended paths\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Vincent Lefevre\"}], \"affected\": [{\"repo\": \"https://github.com/perl/perl5\", \"vendor\": \"perl\", \"product\": \"perl\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.13.6\", \"lessThan\": \"5.41.13\", \"versionType\": \"custom\"}], \"packageName\": \"perl\", \"collectionURL\": \"https://cpan.org/modules\", \"defaultStatus\": \"unaffected\", \"programRoutines\": [{\"name\": \"threads\"}]}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Update perl to an unaffected version, or apply the patch provided in the references section.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Update perl to an unaffected version, or apply the patch provided in the references section.\", \"base64\": false}]}], \"references\": [{\"url\": \"https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch\", \"tags\": [\"patch\"]}, {\"url\": \"https://www.openwall.com/lists/oss-security/2025/05/22/2\", \"tags\": [\"mailing-list\", \"exploit\"]}, {\"url\": \"https://github.com/Perl/perl5/issues/23010\", \"tags\": [\"issue-tracking\"]}, {\"url\": \"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226\", \"tags\": [\"related\"]}, {\"url\": \"https://github.com/Perl/perl5/issues/10387\", \"tags\": [\"related\"]}, {\"url\": \"https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads\", \"tags\": [\"related\"]}, {\"url\": \"https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e\", \"tags\": [\"related\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Perl threads have a working directory race condition where file operations may target unintended paths.\\n\\nIf a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone\\u00a0that handle for the new thread, which is visible from any third (or\\u00a0more) thread already running. \\n\\nThis may lead to unintended operations\\u00a0such as loading code or accessing files from unexpected locations,\\u00a0which a local attacker may be able to exploit.\\n\\nThe bug was introduced in commit\\u00a011a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Perl threads have a working directory race condition where file operations may target unintended paths.\u003cbr\u003e\u003cbr\u003eIf a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone\u0026nbsp;that handle for the new thread, which is visible from any third (or\u0026nbsp;more) thread already running. \u003cbr\u003e\u003cbr\u003eThis may lead to unintended operations\u0026nbsp;such as loading code or accessing files from unexpected locations,\u0026nbsp;which a local attacker may be able to exploit.\u003cbr\u003e\u003cbr\u003eThe bug was introduced in commit\u0026nbsp;11a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-689\", \"description\": \"CWE-689 Permission Race Condition During Resource Copy\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-426\", \"description\": \"CWE-426 Untrusted Search Path\"}]}], \"providerMetadata\": {\"orgId\": \"9b29abf9-4ab0-4765-b253-1875cd9b441e\", \"shortName\": \"CPANSec\", \"dateUpdated\": \"2025-09-05T13:24:00.827Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-40909\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-03T18:09:27.894Z\", \"dateReserved\": \"2025-04-16T09:05:34.360Z\", \"assignerOrgId\": \"9b29abf9-4ab0-4765-b253-1875cd9b441e\", \"datePublished\": \"2025-05-30T12:20:11.237Z\", \"assignerShortName\": \"CPANSec\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
ncsc-2025-0290
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Apple heeft kwetsbaarheden verholpen in macOS.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden omvatten verschillende problemen met betrekking tot de toegang tot gevoelige gebruikersdata, permissies, en beveiligingslekken die konden leiden tot ongeautoriseerde toegang of het omzeilen van sandbox-beperkingen. Deze kwetsbaarheden konden door kwaadwillenden worden misbruikt om gevoelige informatie te verkrijgen of om de stabiliteit van het systeem in gevaar te brengen. De updates zijn cruciaal voor het waarborgen van de integriteit en privacy van gebruikersdata.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "UNIX Symbolic Link (Symlink) Following",
"title": "CWE-61"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Numeric Truncation Error",
"title": "CWE-197"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "CWE-265",
"title": "CWE-265"
},
{
"category": "general",
"text": "CWE-275",
"title": "CWE-275"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "general",
"text": "Permission Race Condition During Resource Copy",
"title": "CWE-689"
},
{
"category": "general",
"text": "Selection of Less-Secure Algorithm During Negotiation (\u0027Algorithm Downgrade\u0027)",
"title": "CWE-757"
},
{
"category": "general",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://support.apple.com/en-us/125110"
},
{
"category": "external",
"summary": "Reference",
"url": "https://support.apple.com/en-us/125111"
},
{
"category": "external",
"summary": "Reference",
"url": "https://support.apple.com/en-us/125112"
}
],
"title": "Kwetsbaarheden verholpen in Apple macOS",
"tracking": {
"current_release_date": "2025-09-16T11:16:20.572265Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2025-0290",
"initial_release_date": "2025-09-16T11:16:20.572265Z",
"revision_history": [
{
"date": "2025-09-16T11:16:20.572265Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "macOS Sequoia"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "macOS Sonoma"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-3"
}
}
],
"category": "product_name",
"name": "macOS Tahoe"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-27280",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27280 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-27280.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
}
],
"title": "CVE-2024-27280"
},
{
"cve": "CVE-2025-6965",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"notes": [
{
"category": "other",
"text": "Numeric Truncation Error",
"title": "CWE-197"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:D/RE:L/U:Green",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-6965 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-6965.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
}
],
"title": "CVE-2025-6965"
},
{
"cve": "CVE-2025-24088",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24088 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-24088.json"
}
],
"title": "CVE-2025-24088"
},
{
"cve": "CVE-2025-24197",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-24197 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-24197.json"
}
],
"title": "CVE-2025-24197"
},
{
"cve": "CVE-2025-31255",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31255 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-31255.json"
}
],
"title": "CVE-2025-31255"
},
{
"cve": "CVE-2025-31259",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31259 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-31259.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
}
],
"title": "CVE-2025-31259"
},
{
"cve": "CVE-2025-31268",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31268 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-31268.json"
}
],
"title": "CVE-2025-31268"
},
{
"cve": "CVE-2025-31269",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31269 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-31269.json"
}
],
"title": "CVE-2025-31269"
},
{
"cve": "CVE-2025-31270",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31270 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-31270.json"
}
],
"title": "CVE-2025-31270"
},
{
"cve": "CVE-2025-31271",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31271 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-31271.json"
}
],
"title": "CVE-2025-31271"
},
{
"cve": "CVE-2025-40909",
"cwe": {
"id": "CWE-426",
"name": "Untrusted Search Path"
},
"notes": [
{
"category": "other",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "other",
"text": "Permission Race Condition During Resource Copy",
"title": "CWE-689"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40909 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-40909.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
}
],
"title": "CVE-2025-40909"
},
{
"cve": "CVE-2025-43190",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43190 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43190.json"
}
],
"title": "CVE-2025-43190"
},
{
"cve": "CVE-2025-43204",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43204 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43204.json"
}
],
"title": "CVE-2025-43204"
},
{
"cve": "CVE-2025-43207",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43207 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43207.json"
}
],
"title": "CVE-2025-43207"
},
{
"cve": "CVE-2025-43208",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43208 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43208.json"
}
],
"title": "CVE-2025-43208"
},
{
"cve": "CVE-2025-43231",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43231 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43231.json"
}
],
"title": "CVE-2025-43231"
},
{
"cve": "CVE-2025-43262",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43262 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43262.json"
}
],
"title": "CVE-2025-43262"
},
{
"cve": "CVE-2025-43272",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43272 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43272.json"
}
],
"title": "CVE-2025-43272"
},
{
"cve": "CVE-2025-43273",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43273 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43273.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
}
],
"title": "CVE-2025-43273"
},
{
"cve": "CVE-2025-43277",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43277 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43277.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
}
],
"title": "CVE-2025-43277"
},
{
"cve": "CVE-2025-43279",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43279 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43279.json"
}
],
"title": "CVE-2025-43279"
},
{
"cve": "CVE-2025-43283",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43283 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43283.json"
}
],
"title": "CVE-2025-43283"
},
{
"cve": "CVE-2025-43285",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43285 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43285.json"
}
],
"title": "CVE-2025-43285"
},
{
"cve": "CVE-2025-43286",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43286 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43286.json"
}
],
"title": "CVE-2025-43286"
},
{
"cve": "CVE-2025-43287",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43287 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43287.json"
}
],
"title": "CVE-2025-43287"
},
{
"cve": "CVE-2025-43291",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43291 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43291.json"
}
],
"title": "CVE-2025-43291"
},
{
"cve": "CVE-2025-43292",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43292 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43292.json"
}
],
"title": "CVE-2025-43292"
},
{
"cve": "CVE-2025-43293",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43293 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43293.json"
}
],
"title": "CVE-2025-43293"
},
{
"cve": "CVE-2025-43294",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43294 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43294.json"
}
],
"title": "CVE-2025-43294"
},
{
"cve": "CVE-2025-43295",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43295 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43295.json"
}
],
"title": "CVE-2025-43295"
},
{
"cve": "CVE-2025-43297",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43297 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43297.json"
}
],
"title": "CVE-2025-43297"
},
{
"cve": "CVE-2025-43298",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43298 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43298.json"
}
],
"title": "CVE-2025-43298"
},
{
"cve": "CVE-2025-43299",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43299 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43299.json"
}
],
"title": "CVE-2025-43299"
},
{
"cve": "CVE-2025-43301",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43301 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43301.json"
}
],
"title": "CVE-2025-43301"
},
{
"cve": "CVE-2025-43302",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43302 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43302.json"
}
],
"title": "CVE-2025-43302"
},
{
"cve": "CVE-2025-43303",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43303 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43303.json"
}
],
"title": "CVE-2025-43303"
},
{
"cve": "CVE-2025-43304",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43304 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43304.json"
}
],
"title": "CVE-2025-43304"
},
{
"cve": "CVE-2025-43305",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43305 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43305.json"
}
],
"title": "CVE-2025-43305"
},
{
"cve": "CVE-2025-43307",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43307 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43307.json"
}
],
"title": "CVE-2025-43307"
},
{
"cve": "CVE-2025-43308",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43308 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43308.json"
}
],
"title": "CVE-2025-43308"
},
{
"cve": "CVE-2025-43310",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43310 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43310.json"
}
],
"title": "CVE-2025-43310"
},
{
"cve": "CVE-2025-43311",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43311 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43311.json"
}
],
"title": "CVE-2025-43311"
},
{
"cve": "CVE-2025-43312",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43312 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43312.json"
}
],
"title": "CVE-2025-43312"
},
{
"cve": "CVE-2025-43314",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43314 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43314.json"
}
],
"title": "CVE-2025-43314"
},
{
"cve": "CVE-2025-43315",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43315 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43315.json"
}
],
"title": "CVE-2025-43315"
},
{
"cve": "CVE-2025-43316",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43316 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43316.json"
}
],
"title": "CVE-2025-43316"
},
{
"cve": "CVE-2025-43317",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43317 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43317.json"
}
],
"title": "CVE-2025-43317"
},
{
"cve": "CVE-2025-43318",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43318 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43318.json"
}
],
"title": "CVE-2025-43318"
},
{
"cve": "CVE-2025-43319",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43319 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43319.json"
}
],
"title": "CVE-2025-43319"
},
{
"cve": "CVE-2025-43321",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43321 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43321.json"
}
],
"title": "CVE-2025-43321"
},
{
"cve": "CVE-2025-43325",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43325 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43325.json"
}
],
"title": "CVE-2025-43325"
},
{
"cve": "CVE-2025-43326",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43326 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43326.json"
}
],
"title": "CVE-2025-43326"
},
{
"cve": "CVE-2025-43327",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43327 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43327.json"
}
],
"title": "CVE-2025-43327"
},
{
"cve": "CVE-2025-43328",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43328 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43328.json"
}
],
"title": "CVE-2025-43328"
},
{
"cve": "CVE-2025-43329",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43329 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43329.json"
}
],
"title": "CVE-2025-43329"
},
{
"cve": "CVE-2025-43330",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43330 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43330.json"
}
],
"title": "CVE-2025-43330"
},
{
"cve": "CVE-2025-43331",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43331 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43331.json"
}
],
"title": "CVE-2025-43331"
},
{
"cve": "CVE-2025-43332",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43332 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43332.json"
}
],
"title": "CVE-2025-43332"
},
{
"cve": "CVE-2025-43333",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43333 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43333.json"
}
],
"title": "CVE-2025-43333"
},
{
"cve": "CVE-2025-43337",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43337 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43337.json"
}
],
"title": "CVE-2025-43337"
},
{
"cve": "CVE-2025-43340",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43340 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43340.json"
}
],
"title": "CVE-2025-43340"
},
{
"cve": "CVE-2025-43341",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43341 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43341.json"
}
],
"title": "CVE-2025-43341"
},
{
"cve": "CVE-2025-43342",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43342 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43342.json"
}
],
"title": "CVE-2025-43342"
},
{
"cve": "CVE-2025-43343",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43343 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43343.json"
}
],
"title": "CVE-2025-43343"
},
{
"cve": "CVE-2025-43344",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43344 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43344.json"
}
],
"title": "CVE-2025-43344"
},
{
"cve": "CVE-2025-43346",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43346 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43346.json"
}
],
"title": "CVE-2025-43346"
},
{
"cve": "CVE-2025-43347",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43347 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43347.json"
}
],
"title": "CVE-2025-43347"
},
{
"cve": "CVE-2025-43349",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43349 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43349.json"
}
],
"title": "CVE-2025-43349"
},
{
"cve": "CVE-2025-43353",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43353 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43353.json"
}
],
"title": "CVE-2025-43353"
},
{
"cve": "CVE-2025-43354",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43354 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43354.json"
}
],
"title": "CVE-2025-43354"
},
{
"cve": "CVE-2025-43355",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43355 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43355.json"
}
],
"title": "CVE-2025-43355"
},
{
"cve": "CVE-2025-43356",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43356 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43356.json"
}
],
"title": "CVE-2025-43356"
},
{
"cve": "CVE-2025-43357",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43357 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43357.json"
}
],
"title": "CVE-2025-43357"
},
{
"cve": "CVE-2025-43358",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43358 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43358.json"
}
],
"title": "CVE-2025-43358"
},
{
"cve": "CVE-2025-43359",
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43359 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43359.json"
}
],
"title": "CVE-2025-43359"
},
{
"cve": "CVE-2025-43366",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43366 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43366.json"
}
],
"title": "CVE-2025-43366"
},
{
"cve": "CVE-2025-43367",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43367 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43367.json"
}
],
"title": "CVE-2025-43367"
},
{
"cve": "CVE-2025-43368",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43368 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43368.json"
}
],
"title": "CVE-2025-43368"
},
{
"cve": "CVE-2025-43369",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43369 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43369.json"
}
],
"title": "CVE-2025-43369"
},
{
"cve": "CVE-2025-43372",
"notes": [
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43372 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43372.json"
}
],
"title": "CVE-2025-43372"
}
]
}
ghsa-jpf5-526x-c5hw
Vulnerability from github
Perl threads have a working directory race condition where file operations may target unintended paths.
If a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone that handle for the new thread, which is visible from any third (or more) thread already running.
This may lead to unintended operations such as loading code or accessing files from unexpected locations, which a local attacker may be able to exploit.
The bug was introduced in commit 11a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6
{
"affected": [],
"aliases": [
"CVE-2025-40909"
],
"database_specific": {
"cwe_ids": [
"CWE-362",
"CWE-426"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-05-30T13:15:22Z",
"severity": "MODERATE"
},
"details": "Perl threads have a working directory race condition where file operations may target unintended paths.\n\nIf a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone\u00a0that handle for the new thread, which is visible from any third (or\u00a0more) thread already running. \n\nThis may lead to unintended operations\u00a0such as loading code or accessing files from unexpected locations,\u00a0which a local attacker may be able to exploit.\n\nThe bug was introduced in commit\u00a011a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6",
"id": "GHSA-jpf5-526x-c5hw",
"modified": "2025-11-03T21:33:59Z",
"published": "2025-05-30T15:30:30Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40909"
},
{
"type": "WEB",
"url": "https://github.com/Perl/perl5/issues/10387"
},
{
"type": "WEB",
"url": "https://github.com/Perl/perl5/issues/23010"
},
{
"type": "WEB",
"url": "https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e"
},
{
"type": "WEB",
"url": "https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch"
},
{
"type": "WEB",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226"
},
{
"type": "WEB",
"url": "https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads"
},
{
"type": "WEB",
"url": "https://www.openwall.com/lists/oss-security/2025/05/22/2"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2025/Sep/53"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2025/Sep/54"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2025/Sep/55"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2025/05/23/1"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2025/05/30/4"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2025/06/02/2"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2025/06/02/5"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2025/06/02/6"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2025/06/02/7"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/1"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"type": "CVSS_V3"
}
]
}
suse-su-2025:20532-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for perl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for perl fixes the following issues:\n\n- CVE-2024-56406: Fixed heap buffer overflow when transliterating \n non-ASCII bytes (bsc#1241083)\n- CVE-2025-40909: Fixed a working directory race condition causing\n file operations to target unintended paths (bsc#1244079)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-191",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20532-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20532-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520532-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20532-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041122.html"
},
{
"category": "self",
"summary": "SUSE Bug 1241083",
"url": "https://bugzilla.suse.com/1241083"
},
{
"category": "self",
"summary": "SUSE Bug 1244079",
"url": "https://bugzilla.suse.com/1244079"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-56406 page",
"url": "https://www.suse.com/security/cve/CVE-2024-56406/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40909 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40909/"
}
],
"title": "Security update for perl",
"tracking": {
"current_release_date": "2025-07-28T14:33:40Z",
"generator": {
"date": "2025-07-28T14:33:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20532-1",
"initial_release_date": "2025-07-28T14:33:40Z",
"revision_history": [
{
"date": "2025-07-28T14:33:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "perl-5.38.2-slfo.1.1_2.1.aarch64",
"product": {
"name": "perl-5.38.2-slfo.1.1_2.1.aarch64",
"product_id": "perl-5.38.2-slfo.1.1_2.1.aarch64"
}
},
{
"category": "product_version",
"name": "perl-base-5.38.2-slfo.1.1_2.1.aarch64",
"product": {
"name": "perl-base-5.38.2-slfo.1.1_2.1.aarch64",
"product_id": "perl-base-5.38.2-slfo.1.1_2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-5.38.2-slfo.1.1_2.1.ppc64le",
"product": {
"name": "perl-5.38.2-slfo.1.1_2.1.ppc64le",
"product_id": "perl-5.38.2-slfo.1.1_2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "perl-base-5.38.2-slfo.1.1_2.1.ppc64le",
"product": {
"name": "perl-base-5.38.2-slfo.1.1_2.1.ppc64le",
"product_id": "perl-base-5.38.2-slfo.1.1_2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-5.38.2-slfo.1.1_2.1.s390x",
"product": {
"name": "perl-5.38.2-slfo.1.1_2.1.s390x",
"product_id": "perl-5.38.2-slfo.1.1_2.1.s390x"
}
},
{
"category": "product_version",
"name": "perl-base-5.38.2-slfo.1.1_2.1.s390x",
"product": {
"name": "perl-base-5.38.2-slfo.1.1_2.1.s390x",
"product_id": "perl-base-5.38.2-slfo.1.1_2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-5.38.2-slfo.1.1_2.1.x86_64",
"product": {
"name": "perl-5.38.2-slfo.1.1_2.1.x86_64",
"product_id": "perl-5.38.2-slfo.1.1_2.1.x86_64"
}
},
{
"category": "product_version",
"name": "perl-base-5.38.2-slfo.1.1_2.1.x86_64",
"product": {
"name": "perl-base-5.38.2-slfo.1.1_2.1.x86_64",
"product_id": "perl-base-5.38.2-slfo.1.1_2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.38.2-slfo.1.1_2.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.aarch64"
},
"product_reference": "perl-5.38.2-slfo.1.1_2.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.38.2-slfo.1.1_2.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.ppc64le"
},
"product_reference": "perl-5.38.2-slfo.1.1_2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.38.2-slfo.1.1_2.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.s390x"
},
"product_reference": "perl-5.38.2-slfo.1.1_2.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.38.2-slfo.1.1_2.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.x86_64"
},
"product_reference": "perl-5.38.2-slfo.1.1_2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.38.2-slfo.1.1_2.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.aarch64"
},
"product_reference": "perl-base-5.38.2-slfo.1.1_2.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.38.2-slfo.1.1_2.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.ppc64le"
},
"product_reference": "perl-base-5.38.2-slfo.1.1_2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.38.2-slfo.1.1_2.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.s390x"
},
"product_reference": "perl-base-5.38.2-slfo.1.1_2.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.38.2-slfo.1.1_2.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.x86_64"
},
"product_reference": "perl-base-5.38.2-slfo.1.1_2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-56406",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-56406"
}
],
"notes": [
{
"category": "general",
"text": "A heap buffer overflow vulnerability was discovered in Perl. \n\nRelease branches 5.34, 5.36, 5.38 and 5.40 are affected, including development versions from 5.33.1 through 5.41.10.\n\nWhen there are non-ASCII bytes in the left-hand-side of the `tr` operator, `S_do_trans_invmap` can overflow the destination pointer `d`.\n\n $ perl -e \u0027$_ = \"\\x{FF}\" x 1000000; tr/\\xFF/\\x{100}/;\u0027 \n Segmentation fault (core dumped)\n\nIt is believed that this vulnerability can enable Denial of Service and possibly Code Execution attacks on platforms that lack sufficient defenses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.x86_64",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-56406",
"url": "https://www.suse.com/security/cve/CVE-2024-56406"
},
{
"category": "external",
"summary": "SUSE Bug 1241083 for CVE-2024-56406",
"url": "https://bugzilla.suse.com/1241083"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.x86_64",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.x86_64",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-28T14:33:40Z",
"details": "important"
}
],
"title": "CVE-2024-56406"
},
{
"cve": "CVE-2025-40909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40909"
}
],
"notes": [
{
"category": "general",
"text": "Perl threads have a working directory race condition where file operations may target unintended paths.\n\nIf a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone that handle for the new thread, which is visible from any third (or more) thread already running. \n\nThis may lead to unintended operations such as loading code or accessing files from unexpected locations, which a local attacker may be able to exploit.\n\nThe bug was introduced in commit 11a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.x86_64",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40909",
"url": "https://www.suse.com/security/cve/CVE-2025-40909"
},
{
"category": "external",
"summary": "SUSE Bug 1244079 for CVE-2025-40909",
"url": "https://bugzilla.suse.com/1244079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.x86_64",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:perl-5.38.2-slfo.1.1_2.1.x86_64",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:perl-base-5.38.2-slfo.1.1_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-28T14:33:40Z",
"details": "moderate"
}
],
"title": "CVE-2025-40909"
}
]
}
suse-su-2025:20456-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for perl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for perl fixes the following issues:\n\n- CVE-2025-40909: Fixed a working directory race condition causing \n file operations to target unintended paths (bsc#1244079)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-372",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20456-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20456-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520456-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20456-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040617.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244079",
"url": "https://bugzilla.suse.com/1244079"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40909 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40909/"
}
],
"title": "Security update for perl",
"tracking": {
"current_release_date": "2025-07-01T11:42:56Z",
"generator": {
"date": "2025-07-01T11:42:56Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20456-1",
"initial_release_date": "2025-07-01T11:42:56Z",
"revision_history": [
{
"date": "2025-07-01T11:42:56Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "perl-5.38.2-4.1.aarch64",
"product": {
"name": "perl-5.38.2-4.1.aarch64",
"product_id": "perl-5.38.2-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "perl-base-5.38.2-4.1.aarch64",
"product": {
"name": "perl-base-5.38.2-4.1.aarch64",
"product_id": "perl-base-5.38.2-4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-5.38.2-4.1.s390x",
"product": {
"name": "perl-5.38.2-4.1.s390x",
"product_id": "perl-5.38.2-4.1.s390x"
}
},
{
"category": "product_version",
"name": "perl-base-5.38.2-4.1.s390x",
"product": {
"name": "perl-base-5.38.2-4.1.s390x",
"product_id": "perl-base-5.38.2-4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-5.38.2-4.1.x86_64",
"product": {
"name": "perl-5.38.2-4.1.x86_64",
"product_id": "perl-5.38.2-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "perl-base-5.38.2-4.1.x86_64",
"product": {
"name": "perl-base-5.38.2-4.1.x86_64",
"product_id": "perl-base-5.38.2-4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.38.2-4.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:perl-5.38.2-4.1.aarch64"
},
"product_reference": "perl-5.38.2-4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.38.2-4.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:perl-5.38.2-4.1.s390x"
},
"product_reference": "perl-5.38.2-4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.38.2-4.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:perl-5.38.2-4.1.x86_64"
},
"product_reference": "perl-5.38.2-4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.38.2-4.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:perl-base-5.38.2-4.1.aarch64"
},
"product_reference": "perl-base-5.38.2-4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.38.2-4.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:perl-base-5.38.2-4.1.s390x"
},
"product_reference": "perl-base-5.38.2-4.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.38.2-4.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:perl-base-5.38.2-4.1.x86_64"
},
"product_reference": "perl-base-5.38.2-4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-40909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40909"
}
],
"notes": [
{
"category": "general",
"text": "Perl threads have a working directory race condition where file operations may target unintended paths.\n\nIf a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone that handle for the new thread, which is visible from any third (or more) thread already running. \n\nThis may lead to unintended operations such as loading code or accessing files from unexpected locations, which a local attacker may be able to exploit.\n\nThe bug was introduced in commit 11a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:perl-5.38.2-4.1.aarch64",
"SUSE Linux Micro 6.0:perl-5.38.2-4.1.s390x",
"SUSE Linux Micro 6.0:perl-5.38.2-4.1.x86_64",
"SUSE Linux Micro 6.0:perl-base-5.38.2-4.1.aarch64",
"SUSE Linux Micro 6.0:perl-base-5.38.2-4.1.s390x",
"SUSE Linux Micro 6.0:perl-base-5.38.2-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40909",
"url": "https://www.suse.com/security/cve/CVE-2025-40909"
},
{
"category": "external",
"summary": "SUSE Bug 1244079 for CVE-2025-40909",
"url": "https://bugzilla.suse.com/1244079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:perl-5.38.2-4.1.aarch64",
"SUSE Linux Micro 6.0:perl-5.38.2-4.1.s390x",
"SUSE Linux Micro 6.0:perl-5.38.2-4.1.x86_64",
"SUSE Linux Micro 6.0:perl-base-5.38.2-4.1.aarch64",
"SUSE Linux Micro 6.0:perl-base-5.38.2-4.1.s390x",
"SUSE Linux Micro 6.0:perl-base-5.38.2-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:perl-5.38.2-4.1.aarch64",
"SUSE Linux Micro 6.0:perl-5.38.2-4.1.s390x",
"SUSE Linux Micro 6.0:perl-5.38.2-4.1.x86_64",
"SUSE Linux Micro 6.0:perl-base-5.38.2-4.1.aarch64",
"SUSE Linux Micro 6.0:perl-base-5.38.2-4.1.s390x",
"SUSE Linux Micro 6.0:perl-base-5.38.2-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-01T11:42:56Z",
"details": "moderate"
}
],
"title": "CVE-2025-40909"
}
]
}
suse-su-2025:02051-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for perl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for perl fixes the following issues:\n\n- CVE-2025-40909: do not change the current directory when cloning an open directory handle (bsc#1244079)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-2051,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2051",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02051-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:02051-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502051-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:02051-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-June/040418.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244079",
"url": "https://bugzilla.suse.com/1244079"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40909 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40909/"
}
],
"title": "Security update for perl",
"tracking": {
"current_release_date": "2025-06-20T12:42:29Z",
"generator": {
"date": "2025-06-20T12:42:29Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:02051-1",
"initial_release_date": "2025-06-20T12:42:29Z",
"revision_history": [
{
"date": "2025-06-20T12:42:29Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "perl-5.18.2-12.29.1.aarch64",
"product": {
"name": "perl-5.18.2-12.29.1.aarch64",
"product_id": "perl-5.18.2-12.29.1.aarch64"
}
},
{
"category": "product_version",
"name": "perl-base-5.18.2-12.29.1.aarch64",
"product": {
"name": "perl-base-5.18.2-12.29.1.aarch64",
"product_id": "perl-base-5.18.2-12.29.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-64bit-5.18.2-12.29.1.aarch64_ilp32",
"product": {
"name": "perl-64bit-5.18.2-12.29.1.aarch64_ilp32",
"product_id": "perl-64bit-5.18.2-12.29.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "perl-base-64bit-5.18.2-12.29.1.aarch64_ilp32",
"product": {
"name": "perl-base-64bit-5.18.2-12.29.1.aarch64_ilp32",
"product_id": "perl-base-64bit-5.18.2-12.29.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-5.18.2-12.29.1.i586",
"product": {
"name": "perl-5.18.2-12.29.1.i586",
"product_id": "perl-5.18.2-12.29.1.i586"
}
},
{
"category": "product_version",
"name": "perl-base-5.18.2-12.29.1.i586",
"product": {
"name": "perl-base-5.18.2-12.29.1.i586",
"product_id": "perl-base-5.18.2-12.29.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-doc-5.18.2-12.29.1.noarch",
"product": {
"name": "perl-doc-5.18.2-12.29.1.noarch",
"product_id": "perl-doc-5.18.2-12.29.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-5.18.2-12.29.1.ppc64le",
"product": {
"name": "perl-5.18.2-12.29.1.ppc64le",
"product_id": "perl-5.18.2-12.29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "perl-base-5.18.2-12.29.1.ppc64le",
"product": {
"name": "perl-base-5.18.2-12.29.1.ppc64le",
"product_id": "perl-base-5.18.2-12.29.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-5.18.2-12.29.1.s390",
"product": {
"name": "perl-5.18.2-12.29.1.s390",
"product_id": "perl-5.18.2-12.29.1.s390"
}
},
{
"category": "product_version",
"name": "perl-base-5.18.2-12.29.1.s390",
"product": {
"name": "perl-base-5.18.2-12.29.1.s390",
"product_id": "perl-base-5.18.2-12.29.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-5.18.2-12.29.1.s390x",
"product": {
"name": "perl-5.18.2-12.29.1.s390x",
"product_id": "perl-5.18.2-12.29.1.s390x"
}
},
{
"category": "product_version",
"name": "perl-32bit-5.18.2-12.29.1.s390x",
"product": {
"name": "perl-32bit-5.18.2-12.29.1.s390x",
"product_id": "perl-32bit-5.18.2-12.29.1.s390x"
}
},
{
"category": "product_version",
"name": "perl-base-5.18.2-12.29.1.s390x",
"product": {
"name": "perl-base-5.18.2-12.29.1.s390x",
"product_id": "perl-base-5.18.2-12.29.1.s390x"
}
},
{
"category": "product_version",
"name": "perl-base-32bit-5.18.2-12.29.1.s390x",
"product": {
"name": "perl-base-32bit-5.18.2-12.29.1.s390x",
"product_id": "perl-base-32bit-5.18.2-12.29.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-5.18.2-12.29.1.x86_64",
"product": {
"name": "perl-5.18.2-12.29.1.x86_64",
"product_id": "perl-5.18.2-12.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "perl-32bit-5.18.2-12.29.1.x86_64",
"product": {
"name": "perl-32bit-5.18.2-12.29.1.x86_64",
"product_id": "perl-32bit-5.18.2-12.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "perl-base-5.18.2-12.29.1.x86_64",
"product": {
"name": "perl-base-5.18.2-12.29.1.x86_64",
"product_id": "perl-base-5.18.2-12.29.1.x86_64"
}
},
{
"category": "product_version",
"name": "perl-base-32bit-5.18.2-12.29.1.x86_64",
"product": {
"name": "perl-base-32bit-5.18.2-12.29.1.x86_64",
"product_id": "perl-base-32bit-5.18.2-12.29.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.18.2-12.29.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:perl-5.18.2-12.29.1.x86_64"
},
"product_reference": "perl-5.18.2-12.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-32bit-5.18.2-12.29.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:perl-32bit-5.18.2-12.29.1.x86_64"
},
"product_reference": "perl-32bit-5.18.2-12.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.18.2-12.29.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:perl-base-5.18.2-12.29.1.x86_64"
},
"product_reference": "perl-base-5.18.2-12.29.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-doc-5.18.2-12.29.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:perl-doc-5.18.2-12.29.1.noarch"
},
"product_reference": "perl-doc-5.18.2-12.29.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-40909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40909"
}
],
"notes": [
{
"category": "general",
"text": "Perl threads have a working directory race condition where file operations may target unintended paths.\n\nIf a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone that handle for the new thread, which is visible from any third (or more) thread already running. \n\nThis may lead to unintended operations such as loading code or accessing files from unexpected locations, which a local attacker may be able to exploit.\n\nThe bug was introduced in commit 11a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:perl-32bit-5.18.2-12.29.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:perl-5.18.2-12.29.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:perl-base-5.18.2-12.29.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:perl-doc-5.18.2-12.29.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40909",
"url": "https://www.suse.com/security/cve/CVE-2025-40909"
},
{
"category": "external",
"summary": "SUSE Bug 1244079 for CVE-2025-40909",
"url": "https://bugzilla.suse.com/1244079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:perl-32bit-5.18.2-12.29.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:perl-5.18.2-12.29.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:perl-base-5.18.2-12.29.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:perl-doc-5.18.2-12.29.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:perl-32bit-5.18.2-12.29.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:perl-5.18.2-12.29.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:perl-base-5.18.2-12.29.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:perl-doc-5.18.2-12.29.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-20T12:42:29Z",
"details": "moderate"
}
],
"title": "CVE-2025-40909"
}
]
}
suse-su-2025:02027-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for perl",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for perl fixes the following issues:\n\n- CVE-2025-40909: Do not change the current directory when cloning an open directory handle (bsc#1244079).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-2027,SUSE-SLE-Micro-5.3-2025-2027,SUSE-SLE-Micro-5.4-2025-2027,SUSE-SLE-Micro-5.5-2025-2027,SUSE-SLE-Module-Basesystem-15-SP6-2025-2027,SUSE-SLE-Module-Basesystem-15-SP7-2025-2027,SUSE-SLE-Module-Development-Tools-15-SP6-2025-2027,SUSE-SLE-Module-Development-Tools-15-SP7-2025-2027,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-2027,SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-2027,SUSE-SUSE-MicroOS-5.1-2025-2027,SUSE-SUSE-MicroOS-5.2-2025-2027,openSUSE-SLE-15.6-2025-2027",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02027-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:02027-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502027-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:02027-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-June/040380.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244079",
"url": "https://bugzilla.suse.com/1244079"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40909 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40909/"
}
],
"title": "Security update for perl",
"tracking": {
"current_release_date": "2025-06-19T15:15:57Z",
"generator": {
"date": "2025-06-19T15:15:57Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:02027-1",
"initial_release_date": "2025-06-19T15:15:57Z",
"revision_history": [
{
"date": "2025-06-19T15:15:57Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "perl-5.26.1-150300.17.20.1.aarch64",
"product": {
"name": "perl-5.26.1-150300.17.20.1.aarch64",
"product_id": "perl-5.26.1-150300.17.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "perl-base-5.26.1-150300.17.20.1.aarch64",
"product": {
"name": "perl-base-5.26.1-150300.17.20.1.aarch64",
"product_id": "perl-base-5.26.1-150300.17.20.1.aarch64"
}
},
{
"category": "product_version",
"name": "perl-core-DB_File-5.26.1-150300.17.20.1.aarch64",
"product": {
"name": "perl-core-DB_File-5.26.1-150300.17.20.1.aarch64",
"product_id": "perl-core-DB_File-5.26.1-150300.17.20.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-64bit-5.26.1-150300.17.20.1.aarch64_ilp32",
"product": {
"name": "perl-64bit-5.26.1-150300.17.20.1.aarch64_ilp32",
"product_id": "perl-64bit-5.26.1-150300.17.20.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "perl-base-64bit-5.26.1-150300.17.20.1.aarch64_ilp32",
"product": {
"name": "perl-base-64bit-5.26.1-150300.17.20.1.aarch64_ilp32",
"product_id": "perl-base-64bit-5.26.1-150300.17.20.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "perl-core-DB_File-64bit-5.26.1-150300.17.20.1.aarch64_ilp32",
"product": {
"name": "perl-core-DB_File-64bit-5.26.1-150300.17.20.1.aarch64_ilp32",
"product_id": "perl-core-DB_File-64bit-5.26.1-150300.17.20.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-5.26.1-150300.17.20.1.i586",
"product": {
"name": "perl-5.26.1-150300.17.20.1.i586",
"product_id": "perl-5.26.1-150300.17.20.1.i586"
}
},
{
"category": "product_version",
"name": "perl-base-5.26.1-150300.17.20.1.i586",
"product": {
"name": "perl-base-5.26.1-150300.17.20.1.i586",
"product_id": "perl-base-5.26.1-150300.17.20.1.i586"
}
},
{
"category": "product_version",
"name": "perl-core-DB_File-5.26.1-150300.17.20.1.i586",
"product": {
"name": "perl-core-DB_File-5.26.1-150300.17.20.1.i586",
"product_id": "perl-core-DB_File-5.26.1-150300.17.20.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-doc-5.26.1-150300.17.20.1.noarch",
"product": {
"name": "perl-doc-5.26.1-150300.17.20.1.noarch",
"product_id": "perl-doc-5.26.1-150300.17.20.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-5.26.1-150300.17.20.1.ppc64le",
"product": {
"name": "perl-5.26.1-150300.17.20.1.ppc64le",
"product_id": "perl-5.26.1-150300.17.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "perl-base-5.26.1-150300.17.20.1.ppc64le",
"product": {
"name": "perl-base-5.26.1-150300.17.20.1.ppc64le",
"product_id": "perl-base-5.26.1-150300.17.20.1.ppc64le"
}
},
{
"category": "product_version",
"name": "perl-core-DB_File-5.26.1-150300.17.20.1.ppc64le",
"product": {
"name": "perl-core-DB_File-5.26.1-150300.17.20.1.ppc64le",
"product_id": "perl-core-DB_File-5.26.1-150300.17.20.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-5.26.1-150300.17.20.1.s390x",
"product": {
"name": "perl-5.26.1-150300.17.20.1.s390x",
"product_id": "perl-5.26.1-150300.17.20.1.s390x"
}
},
{
"category": "product_version",
"name": "perl-base-5.26.1-150300.17.20.1.s390x",
"product": {
"name": "perl-base-5.26.1-150300.17.20.1.s390x",
"product_id": "perl-base-5.26.1-150300.17.20.1.s390x"
}
},
{
"category": "product_version",
"name": "perl-core-DB_File-5.26.1-150300.17.20.1.s390x",
"product": {
"name": "perl-core-DB_File-5.26.1-150300.17.20.1.s390x",
"product_id": "perl-core-DB_File-5.26.1-150300.17.20.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-5.26.1-150300.17.20.1.x86_64",
"product": {
"name": "perl-5.26.1-150300.17.20.1.x86_64",
"product_id": "perl-5.26.1-150300.17.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "perl-32bit-5.26.1-150300.17.20.1.x86_64",
"product": {
"name": "perl-32bit-5.26.1-150300.17.20.1.x86_64",
"product_id": "perl-32bit-5.26.1-150300.17.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "perl-base-5.26.1-150300.17.20.1.x86_64",
"product": {
"name": "perl-base-5.26.1-150300.17.20.1.x86_64",
"product_id": "perl-base-5.26.1-150300.17.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "perl-base-32bit-5.26.1-150300.17.20.1.x86_64",
"product": {
"name": "perl-base-32bit-5.26.1-150300.17.20.1.x86_64",
"product_id": "perl-base-32bit-5.26.1-150300.17.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "perl-core-DB_File-5.26.1-150300.17.20.1.x86_64",
"product": {
"name": "perl-core-DB_File-5.26.1-150300.17.20.1.x86_64",
"product_id": "perl-core-DB_File-5.26.1-150300.17.20.1.x86_64"
}
},
{
"category": "product_version",
"name": "perl-core-DB_File-32bit-5.26.1-150300.17.20.1.x86_64",
"product": {
"name": "perl-core-DB_File-32bit-5.26.1-150300.17.20.1.x86_64",
"product_id": "perl-core-DB_File-32bit-5.26.1-150300.17.20.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:perl-5.26.1-150300.17.20.1.aarch64"
},
"product_reference": "perl-5.26.1-150300.17.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:perl-5.26.1-150300.17.20.1.s390x"
},
"product_reference": "perl-5.26.1-150300.17.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:perl-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:perl-base-5.26.1-150300.17.20.1.aarch64"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:perl-base-5.26.1-150300.17.20.1.s390x"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:perl-base-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:perl-5.26.1-150300.17.20.1.aarch64"
},
"product_reference": "perl-5.26.1-150300.17.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:perl-5.26.1-150300.17.20.1.s390x"
},
"product_reference": "perl-5.26.1-150300.17.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:perl-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:perl-base-5.26.1-150300.17.20.1.aarch64"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:perl-base-5.26.1-150300.17.20.1.s390x"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:perl-base-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:perl-5.26.1-150300.17.20.1.aarch64"
},
"product_reference": "perl-5.26.1-150300.17.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:perl-5.26.1-150300.17.20.1.ppc64le"
},
"product_reference": "perl-5.26.1-150300.17.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:perl-5.26.1-150300.17.20.1.s390x"
},
"product_reference": "perl-5.26.1-150300.17.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:perl-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:perl-base-5.26.1-150300.17.20.1.aarch64"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:perl-base-5.26.1-150300.17.20.1.ppc64le"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:perl-base-5.26.1-150300.17.20.1.s390x"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:perl-base-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-5.26.1-150300.17.20.1.aarch64"
},
"product_reference": "perl-5.26.1-150300.17.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-5.26.1-150300.17.20.1.ppc64le"
},
"product_reference": "perl-5.26.1-150300.17.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-5.26.1-150300.17.20.1.s390x"
},
"product_reference": "perl-5.26.1-150300.17.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-base-5.26.1-150300.17.20.1.aarch64"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-base-5.26.1-150300.17.20.1.ppc64le"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-base-5.26.1-150300.17.20.1.s390x"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-base-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-32bit-5.26.1-150300.17.20.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-base-32bit-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-base-32bit-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-core-DB_File-5.26.1-150300.17.20.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-core-DB_File-5.26.1-150300.17.20.1.aarch64"
},
"product_reference": "perl-core-DB_File-5.26.1-150300.17.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-core-DB_File-5.26.1-150300.17.20.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-core-DB_File-5.26.1-150300.17.20.1.ppc64le"
},
"product_reference": "perl-core-DB_File-5.26.1-150300.17.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-core-DB_File-5.26.1-150300.17.20.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-core-DB_File-5.26.1-150300.17.20.1.s390x"
},
"product_reference": "perl-core-DB_File-5.26.1-150300.17.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-core-DB_File-5.26.1-150300.17.20.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-core-DB_File-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-core-DB_File-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-5.26.1-150300.17.20.1.aarch64"
},
"product_reference": "perl-5.26.1-150300.17.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-5.26.1-150300.17.20.1.ppc64le"
},
"product_reference": "perl-5.26.1-150300.17.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-5.26.1-150300.17.20.1.s390x"
},
"product_reference": "perl-5.26.1-150300.17.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-base-5.26.1-150300.17.20.1.aarch64"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-base-5.26.1-150300.17.20.1.ppc64le"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-base-5.26.1-150300.17.20.1.s390x"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-base-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-32bit-5.26.1-150300.17.20.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-base-32bit-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-base-32bit-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-core-DB_File-5.26.1-150300.17.20.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-core-DB_File-5.26.1-150300.17.20.1.aarch64"
},
"product_reference": "perl-core-DB_File-5.26.1-150300.17.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-core-DB_File-5.26.1-150300.17.20.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-core-DB_File-5.26.1-150300.17.20.1.ppc64le"
},
"product_reference": "perl-core-DB_File-5.26.1-150300.17.20.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-core-DB_File-5.26.1-150300.17.20.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-core-DB_File-5.26.1-150300.17.20.1.s390x"
},
"product_reference": "perl-core-DB_File-5.26.1-150300.17.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-core-DB_File-5.26.1-150300.17.20.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-core-DB_File-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-core-DB_File-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-doc-5.26.1-150300.17.20.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:perl-doc-5.26.1-150300.17.20.1.noarch"
},
"product_reference": "perl-doc-5.26.1-150300.17.20.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-doc-5.26.1-150300.17.20.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:perl-doc-5.26.1-150300.17.20.1.noarch"
},
"product_reference": "perl-doc-5.26.1-150300.17.20.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-32bit-5.26.1-150300.17.20.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:perl-32bit-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-32bit-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-32bit-5.26.1-150300.17.20.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP7:perl-32bit-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-32bit-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:perl-5.26.1-150300.17.20.1.aarch64"
},
"product_reference": "perl-5.26.1-150300.17.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:perl-5.26.1-150300.17.20.1.s390x"
},
"product_reference": "perl-5.26.1-150300.17.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:perl-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:perl-base-5.26.1-150300.17.20.1.aarch64"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:perl-base-5.26.1-150300.17.20.1.s390x"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:perl-base-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:perl-5.26.1-150300.17.20.1.aarch64"
},
"product_reference": "perl-5.26.1-150300.17.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:perl-5.26.1-150300.17.20.1.s390x"
},
"product_reference": "perl-5.26.1-150300.17.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:perl-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:perl-base-5.26.1-150300.17.20.1.aarch64"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:perl-base-5.26.1-150300.17.20.1.s390x"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:perl-base-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:perl-5.26.1-150300.17.20.1.aarch64"
},
"product_reference": "perl-5.26.1-150300.17.20.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:perl-5.26.1-150300.17.20.1.ppc64le"
},
"product_reference": "perl-5.26.1-150300.17.20.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:perl-5.26.1-150300.17.20.1.s390x"
},
"product_reference": "perl-5.26.1-150300.17.20.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.26.1-150300.17.20.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:perl-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-32bit-5.26.1-150300.17.20.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:perl-32bit-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-32bit-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:perl-base-5.26.1-150300.17.20.1.aarch64"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:perl-base-5.26.1-150300.17.20.1.ppc64le"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:perl-base-5.26.1-150300.17.20.1.s390x"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.26.1-150300.17.20.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:perl-base-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-base-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-32bit-5.26.1-150300.17.20.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:perl-base-32bit-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-base-32bit-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-core-DB_File-5.26.1-150300.17.20.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:perl-core-DB_File-5.26.1-150300.17.20.1.aarch64"
},
"product_reference": "perl-core-DB_File-5.26.1-150300.17.20.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-core-DB_File-5.26.1-150300.17.20.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:perl-core-DB_File-5.26.1-150300.17.20.1.ppc64le"
},
"product_reference": "perl-core-DB_File-5.26.1-150300.17.20.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-core-DB_File-5.26.1-150300.17.20.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:perl-core-DB_File-5.26.1-150300.17.20.1.s390x"
},
"product_reference": "perl-core-DB_File-5.26.1-150300.17.20.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-core-DB_File-5.26.1-150300.17.20.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:perl-core-DB_File-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-core-DB_File-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-core-DB_File-32bit-5.26.1-150300.17.20.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:perl-core-DB_File-32bit-5.26.1-150300.17.20.1.x86_64"
},
"product_reference": "perl-core-DB_File-32bit-5.26.1-150300.17.20.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-doc-5.26.1-150300.17.20.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:perl-doc-5.26.1-150300.17.20.1.noarch"
},
"product_reference": "perl-doc-5.26.1-150300.17.20.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-40909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40909"
}
],
"notes": [
{
"category": "general",
"text": "Perl threads have a working directory race condition where file operations may target unintended paths.\n\nIf a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone that handle for the new thread, which is visible from any third (or more) thread already running. \n\nThis may lead to unintended operations such as loading code or accessing files from unexpected locations, which a local attacker may be able to exploit.\n\nThe bug was introduced in commit 11a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:perl-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:perl-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.1:perl-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:perl-base-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:perl-base-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.1:perl-base-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:perl-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:perl-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.2:perl-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:perl-base-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:perl-base-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.2:perl-base-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:perl-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:perl-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.3:perl-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:perl-base-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:perl-base-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.3:perl-base-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:perl-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:perl-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.4:perl-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:perl-base-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:perl-base-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.4:perl-base-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:perl-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:perl-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:perl-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:perl-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:perl-base-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:perl-base-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:perl-base-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:perl-base-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-base-32bit-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-base-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-base-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-base-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-base-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-core-DB_File-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-core-DB_File-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-core-DB_File-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-core-DB_File-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-base-32bit-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-base-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-base-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-base-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-base-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-core-DB_File-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-core-DB_File-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-core-DB_File-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-core-DB_File-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:perl-doc-5.26.1-150300.17.20.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:perl-doc-5.26.1-150300.17.20.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:perl-32bit-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:perl-32bit-5.26.1-150300.17.20.1.x86_64",
"openSUSE Leap 15.6:perl-32bit-5.26.1-150300.17.20.1.x86_64",
"openSUSE Leap 15.6:perl-5.26.1-150300.17.20.1.aarch64",
"openSUSE Leap 15.6:perl-5.26.1-150300.17.20.1.ppc64le",
"openSUSE Leap 15.6:perl-5.26.1-150300.17.20.1.s390x",
"openSUSE Leap 15.6:perl-5.26.1-150300.17.20.1.x86_64",
"openSUSE Leap 15.6:perl-base-32bit-5.26.1-150300.17.20.1.x86_64",
"openSUSE Leap 15.6:perl-base-5.26.1-150300.17.20.1.aarch64",
"openSUSE Leap 15.6:perl-base-5.26.1-150300.17.20.1.ppc64le",
"openSUSE Leap 15.6:perl-base-5.26.1-150300.17.20.1.s390x",
"openSUSE Leap 15.6:perl-base-5.26.1-150300.17.20.1.x86_64",
"openSUSE Leap 15.6:perl-core-DB_File-32bit-5.26.1-150300.17.20.1.x86_64",
"openSUSE Leap 15.6:perl-core-DB_File-5.26.1-150300.17.20.1.aarch64",
"openSUSE Leap 15.6:perl-core-DB_File-5.26.1-150300.17.20.1.ppc64le",
"openSUSE Leap 15.6:perl-core-DB_File-5.26.1-150300.17.20.1.s390x",
"openSUSE Leap 15.6:perl-core-DB_File-5.26.1-150300.17.20.1.x86_64",
"openSUSE Leap 15.6:perl-doc-5.26.1-150300.17.20.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40909",
"url": "https://www.suse.com/security/cve/CVE-2025-40909"
},
{
"category": "external",
"summary": "SUSE Bug 1244079 for CVE-2025-40909",
"url": "https://bugzilla.suse.com/1244079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:perl-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:perl-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.1:perl-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:perl-base-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:perl-base-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.1:perl-base-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:perl-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:perl-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.2:perl-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:perl-base-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:perl-base-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.2:perl-base-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:perl-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:perl-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.3:perl-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:perl-base-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:perl-base-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.3:perl-base-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:perl-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:perl-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.4:perl-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:perl-base-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:perl-base-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.4:perl-base-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:perl-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:perl-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:perl-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:perl-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:perl-base-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:perl-base-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:perl-base-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:perl-base-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-base-32bit-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-base-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-base-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-base-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-base-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-core-DB_File-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-core-DB_File-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-core-DB_File-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-core-DB_File-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-base-32bit-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-base-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-base-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-base-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-base-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-core-DB_File-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-core-DB_File-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-core-DB_File-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-core-DB_File-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:perl-doc-5.26.1-150300.17.20.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:perl-doc-5.26.1-150300.17.20.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:perl-32bit-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:perl-32bit-5.26.1-150300.17.20.1.x86_64",
"openSUSE Leap 15.6:perl-32bit-5.26.1-150300.17.20.1.x86_64",
"openSUSE Leap 15.6:perl-5.26.1-150300.17.20.1.aarch64",
"openSUSE Leap 15.6:perl-5.26.1-150300.17.20.1.ppc64le",
"openSUSE Leap 15.6:perl-5.26.1-150300.17.20.1.s390x",
"openSUSE Leap 15.6:perl-5.26.1-150300.17.20.1.x86_64",
"openSUSE Leap 15.6:perl-base-32bit-5.26.1-150300.17.20.1.x86_64",
"openSUSE Leap 15.6:perl-base-5.26.1-150300.17.20.1.aarch64",
"openSUSE Leap 15.6:perl-base-5.26.1-150300.17.20.1.ppc64le",
"openSUSE Leap 15.6:perl-base-5.26.1-150300.17.20.1.s390x",
"openSUSE Leap 15.6:perl-base-5.26.1-150300.17.20.1.x86_64",
"openSUSE Leap 15.6:perl-core-DB_File-32bit-5.26.1-150300.17.20.1.x86_64",
"openSUSE Leap 15.6:perl-core-DB_File-5.26.1-150300.17.20.1.aarch64",
"openSUSE Leap 15.6:perl-core-DB_File-5.26.1-150300.17.20.1.ppc64le",
"openSUSE Leap 15.6:perl-core-DB_File-5.26.1-150300.17.20.1.s390x",
"openSUSE Leap 15.6:perl-core-DB_File-5.26.1-150300.17.20.1.x86_64",
"openSUSE Leap 15.6:perl-doc-5.26.1-150300.17.20.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:perl-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:perl-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.1:perl-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:perl-base-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:perl-base-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.1:perl-base-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:perl-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:perl-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.2:perl-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:perl-base-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:perl-base-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.2:perl-base-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:perl-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:perl-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.3:perl-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:perl-base-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:perl-base-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.3:perl-base-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:perl-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:perl-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.4:perl-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:perl-base-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:perl-base-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.4:perl-base-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:perl-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:perl-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:perl-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:perl-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:perl-base-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:perl-base-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:perl-base-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Micro 5.5:perl-base-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-base-32bit-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-base-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-base-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-base-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-base-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-core-DB_File-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-core-DB_File-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-core-DB_File-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:perl-core-DB_File-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-base-32bit-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-base-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-base-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-base-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-base-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-core-DB_File-5.26.1-150300.17.20.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-core-DB_File-5.26.1-150300.17.20.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-core-DB_File-5.26.1-150300.17.20.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:perl-core-DB_File-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:perl-doc-5.26.1-150300.17.20.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:perl-doc-5.26.1-150300.17.20.1.noarch",
"SUSE Linux Enterprise Module for Package Hub 15 SP6:perl-32bit-5.26.1-150300.17.20.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP7:perl-32bit-5.26.1-150300.17.20.1.x86_64",
"openSUSE Leap 15.6:perl-32bit-5.26.1-150300.17.20.1.x86_64",
"openSUSE Leap 15.6:perl-5.26.1-150300.17.20.1.aarch64",
"openSUSE Leap 15.6:perl-5.26.1-150300.17.20.1.ppc64le",
"openSUSE Leap 15.6:perl-5.26.1-150300.17.20.1.s390x",
"openSUSE Leap 15.6:perl-5.26.1-150300.17.20.1.x86_64",
"openSUSE Leap 15.6:perl-base-32bit-5.26.1-150300.17.20.1.x86_64",
"openSUSE Leap 15.6:perl-base-5.26.1-150300.17.20.1.aarch64",
"openSUSE Leap 15.6:perl-base-5.26.1-150300.17.20.1.ppc64le",
"openSUSE Leap 15.6:perl-base-5.26.1-150300.17.20.1.s390x",
"openSUSE Leap 15.6:perl-base-5.26.1-150300.17.20.1.x86_64",
"openSUSE Leap 15.6:perl-core-DB_File-32bit-5.26.1-150300.17.20.1.x86_64",
"openSUSE Leap 15.6:perl-core-DB_File-5.26.1-150300.17.20.1.aarch64",
"openSUSE Leap 15.6:perl-core-DB_File-5.26.1-150300.17.20.1.ppc64le",
"openSUSE Leap 15.6:perl-core-DB_File-5.26.1-150300.17.20.1.s390x",
"openSUSE Leap 15.6:perl-core-DB_File-5.26.1-150300.17.20.1.x86_64",
"openSUSE Leap 15.6:perl-doc-5.26.1-150300.17.20.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-19T15:15:57Z",
"details": "moderate"
}
],
"title": "CVE-2025-40909"
}
]
}
CERTFR-2025-AVI-0756
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2013-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2017-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
},
{
"name": "CVE-2018-3280",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
},
{
"name": "CVE-2018-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
},
{
"name": "CVE-2018-3285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
},
{
"name": "CVE-2018-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
},
{
"name": "CVE-2018-3186",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
},
{
"name": "CVE-2018-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
},
{
"name": "CVE-2018-3286",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
},
{
"name": "CVE-2018-3170",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
},
{
"name": "CVE-2018-3279",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
},
{
"name": "CVE-2018-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
},
{
"name": "CVE-2018-3203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
},
{
"name": "CVE-2018-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
},
{
"name": "CVE-2019-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
},
{
"name": "CVE-2019-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
},
{
"name": "CVE-2019-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
},
{
"name": "CVE-2019-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
},
{
"name": "CVE-2019-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
},
{
"name": "CVE-2019-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
},
{
"name": "CVE-2019-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
},
{
"name": "CVE-2019-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
},
{
"name": "CVE-2019-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
},
{
"name": "CVE-2019-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
},
{
"name": "CVE-2019-2634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
},
{
"name": "CVE-2019-2587",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
},
{
"name": "CVE-2019-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
},
{
"name": "CVE-2019-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
},
{
"name": "CVE-2019-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
},
{
"name": "CVE-2019-2630",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
},
{
"name": "CVE-2019-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
},
{
"name": "CVE-2019-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
},
{
"name": "CVE-2019-2695",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
},
{
"name": "CVE-2019-2596",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
},
{
"name": "CVE-2019-2580",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
},
{
"name": "CVE-2019-2644",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
},
{
"name": "CVE-2019-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
},
{
"name": "CVE-2019-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
},
{
"name": "CVE-2019-2636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
},
{
"name": "CVE-2019-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
},
{
"name": "CVE-2019-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
},
{
"name": "CVE-2019-2593",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
},
{
"name": "CVE-2019-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
},
{
"name": "CVE-2019-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
},
{
"name": "CVE-2019-2631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
},
{
"name": "CVE-2019-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
},
{
"name": "CVE-2019-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
},
{
"name": "CVE-2019-2688",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
},
{
"name": "CVE-2019-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
},
{
"name": "CVE-2019-2635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
},
{
"name": "CVE-2019-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
},
{
"name": "CVE-2019-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
},
{
"name": "CVE-2019-2685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
},
{
"name": "CVE-2019-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
},
{
"name": "CVE-2019-2607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2019-2811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
},
{
"name": "CVE-2019-2740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
},
{
"name": "CVE-2019-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
},
{
"name": "CVE-2019-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
},
{
"name": "CVE-2019-2738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
},
{
"name": "CVE-2019-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
},
{
"name": "CVE-2019-2737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
},
{
"name": "CVE-2019-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
},
{
"name": "CVE-2019-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
},
{
"name": "CVE-2019-2822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
},
{
"name": "CVE-2019-2802",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
},
{
"name": "CVE-2019-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
},
{
"name": "CVE-2019-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
},
{
"name": "CVE-2019-2826",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
},
{
"name": "CVE-2019-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
},
{
"name": "CVE-2019-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
},
{
"name": "CVE-2019-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
},
{
"name": "CVE-2019-2791",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
},
{
"name": "CVE-2019-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
},
{
"name": "CVE-2019-2796",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
},
{
"name": "CVE-2019-2815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
},
{
"name": "CVE-2019-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
},
{
"name": "CVE-2019-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
},
{
"name": "CVE-2019-2758",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
},
{
"name": "CVE-2019-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
},
{
"name": "CVE-2019-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
},
{
"name": "CVE-2019-2747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
},
{
"name": "CVE-2019-2741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
},
{
"name": "CVE-2019-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
},
{
"name": "CVE-2019-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
},
{
"name": "CVE-2019-2743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
},
{
"name": "CVE-2019-2739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
},
{
"name": "CVE-2019-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
},
{
"name": "CVE-2019-2797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
},
{
"name": "CVE-2019-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
},
{
"name": "CVE-2019-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
},
{
"name": "CVE-2019-2746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
},
{
"name": "CVE-2019-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
},
{
"name": "CVE-2019-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
},
{
"name": "CVE-2019-2914",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
},
{
"name": "CVE-2019-2960",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
},
{
"name": "CVE-2019-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
},
{
"name": "CVE-2019-2968",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
},
{
"name": "CVE-2019-2993",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
},
{
"name": "CVE-2019-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
},
{
"name": "CVE-2019-2969",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
},
{
"name": "CVE-2019-3011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
},
{
"name": "CVE-2019-2967",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
},
{
"name": "CVE-2019-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
},
{
"name": "CVE-2019-2966",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
},
{
"name": "CVE-2019-2957",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
},
{
"name": "CVE-2019-2948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
},
{
"name": "CVE-2019-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
},
{
"name": "CVE-2019-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
},
{
"name": "CVE-2019-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
},
{
"name": "CVE-2019-2911",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
},
{
"name": "CVE-2019-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
},
{
"name": "CVE-2019-2910",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
},
{
"name": "CVE-2019-3018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
},
{
"name": "CVE-2019-2974",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
},
{
"name": "CVE-2019-2991",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
},
{
"name": "CVE-2019-2997",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
},
{
"name": "CVE-2019-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
},
{
"name": "CVE-2019-3003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
},
{
"name": "CVE-2019-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
},
{
"name": "CVE-2019-2963",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
},
{
"name": "CVE-2020-2579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
},
{
"name": "CVE-2020-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
},
{
"name": "CVE-2020-2577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
},
{
"name": "CVE-2020-2679",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
},
{
"name": "CVE-2020-2570",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
},
{
"name": "CVE-2020-2572",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
},
{
"name": "CVE-2020-2627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
},
{
"name": "CVE-2020-2660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
},
{
"name": "CVE-2020-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
},
{
"name": "CVE-2020-2573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
},
{
"name": "CVE-2020-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
},
{
"name": "CVE-2020-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
},
{
"name": "CVE-2020-2574",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
},
{
"name": "CVE-2020-2770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
},
{
"name": "CVE-2020-2925",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
},
{
"name": "CVE-2020-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
},
{
"name": "CVE-2020-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
},
{
"name": "CVE-2020-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
},
{
"name": "CVE-2020-2897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
},
{
"name": "CVE-2020-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
},
{
"name": "CVE-2020-2765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
},
{
"name": "CVE-2020-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
},
{
"name": "CVE-2020-2790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
},
{
"name": "CVE-2020-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
},
{
"name": "CVE-2020-2904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
},
{
"name": "CVE-2020-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
},
{
"name": "CVE-2020-2760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
},
{
"name": "CVE-2020-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
},
{
"name": "CVE-2020-2903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
},
{
"name": "CVE-2020-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
},
{
"name": "CVE-2020-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
},
{
"name": "CVE-2020-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
},
{
"name": "CVE-2020-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
},
{
"name": "CVE-2020-2926",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
},
{
"name": "CVE-2020-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
},
{
"name": "CVE-2020-2921",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
},
{
"name": "CVE-2020-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
},
{
"name": "CVE-2020-2892",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
},
{
"name": "CVE-2020-2896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
},
{
"name": "CVE-2020-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
},
{
"name": "CVE-2020-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
},
{
"name": "CVE-2020-2930",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
},
{
"name": "CVE-2020-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
},
{
"name": "CVE-2020-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
},
{
"name": "CVE-2020-2763",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
},
{
"name": "CVE-2020-14550",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
},
{
"name": "CVE-2020-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
},
{
"name": "CVE-2020-14559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
},
{
"name": "CVE-2020-14576",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
},
{
"name": "CVE-2020-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
},
{
"name": "CVE-2020-14547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
},
{
"name": "CVE-2020-14553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
},
{
"name": "CVE-2020-14539",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
},
{
"name": "CVE-2020-14845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
},
{
"name": "CVE-2020-14799",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
},
{
"name": "CVE-2020-14793",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
},
{
"name": "CVE-2020-14888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
},
{
"name": "CVE-2020-14790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
},
{
"name": "CVE-2020-14789",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
},
{
"name": "CVE-2020-14672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
},
{
"name": "CVE-2020-14846",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
},
{
"name": "CVE-2020-14771",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
},
{
"name": "CVE-2020-14873",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
},
{
"name": "CVE-2020-14791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
},
{
"name": "CVE-2020-14769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
},
{
"name": "CVE-2020-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
},
{
"name": "CVE-2020-14809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
},
{
"name": "CVE-2020-14860",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
},
{
"name": "CVE-2020-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
},
{
"name": "CVE-2020-14861",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
},
{
"name": "CVE-2020-14773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
},
{
"name": "CVE-2020-14776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
},
{
"name": "CVE-2020-14852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
},
{
"name": "CVE-2020-14760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
},
{
"name": "CVE-2020-14870",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
},
{
"name": "CVE-2020-14837",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
},
{
"name": "CVE-2020-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
},
{
"name": "CVE-2020-14836",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
},
{
"name": "CVE-2020-14829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
},
{
"name": "CVE-2020-14868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
},
{
"name": "CVE-2020-14827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
},
{
"name": "CVE-2020-14839",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
},
{
"name": "CVE-2020-14777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
},
{
"name": "CVE-2020-14812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
},
{
"name": "CVE-2020-14775",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
},
{
"name": "CVE-2020-14838",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
},
{
"name": "CVE-2020-14869",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
},
{
"name": "CVE-2020-14765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
},
{
"name": "CVE-2020-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
},
{
"name": "CVE-2020-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
},
{
"name": "CVE-2020-14830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
},
{
"name": "CVE-2020-14828",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
},
{
"name": "CVE-2020-14804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
},
{
"name": "CVE-2020-14800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
},
{
"name": "CVE-2020-14891",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
},
{
"name": "CVE-2020-14848",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
},
{
"name": "CVE-2020-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
},
{
"name": "CVE-2020-14785",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
},
{
"name": "CVE-2020-14794",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
},
{
"name": "CVE-2020-14786",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
},
{
"name": "CVE-2021-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
},
{
"name": "CVE-2021-2060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
},
{
"name": "CVE-2021-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
},
{
"name": "CVE-2021-2032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
},
{
"name": "CVE-2021-2036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
},
{
"name": "CVE-2021-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
},
{
"name": "CVE-2021-2011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
},
{
"name": "CVE-2021-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2021-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
},
{
"name": "CVE-2021-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
},
{
"name": "CVE-2021-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
},
{
"name": "CVE-2021-2293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
},
{
"name": "CVE-2021-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
},
{
"name": "CVE-2021-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-2298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2021-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2021-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2021-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2021-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
},
{
"name": "CVE-2021-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
},
{
"name": "CVE-2021-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
},
{
"name": "CVE-2021-2212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2021-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
},
{
"name": "CVE-2021-2278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
},
{
"name": "CVE-2021-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
},
{
"name": "CVE-2021-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
},
{
"name": "CVE-2021-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
},
{
"name": "CVE-2021-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2021-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
},
{
"name": "CVE-2021-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2021-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2021-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
},
{
"name": "CVE-2021-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
},
{
"name": "CVE-2021-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
},
{
"name": "CVE-2021-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
},
{
"name": "CVE-2021-2339",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
},
{
"name": "CVE-2021-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
},
{
"name": "CVE-2021-2387",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
},
{
"name": "CVE-2021-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2021-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
},
{
"name": "CVE-2021-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
},
{
"name": "CVE-2021-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
},
{
"name": "CVE-2021-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
},
{
"name": "CVE-2021-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2021-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
},
{
"name": "CVE-2021-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
},
{
"name": "CVE-2021-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2021-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
},
{
"name": "CVE-2021-2352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
},
{
"name": "CVE-2021-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
},
{
"name": "CVE-2021-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
},
{
"name": "CVE-2021-2340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2021-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
},
{
"name": "CVE-2021-2356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
},
{
"name": "CVE-2021-2411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
},
{
"name": "CVE-2021-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
},
{
"name": "CVE-2021-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
},
{
"name": "CVE-2021-2354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
},
{
"name": "CVE-2021-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2020-28500",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-35640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
},
{
"name": "CVE-2021-35626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
},
{
"name": "CVE-2021-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
},
{
"name": "CVE-2021-35624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
},
{
"name": "CVE-2021-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
},
{
"name": "CVE-2021-35628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
},
{
"name": "CVE-2021-35630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
},
{
"name": "CVE-2021-35644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
},
{
"name": "CVE-2021-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
},
{
"name": "CVE-2021-35638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
},
{
"name": "CVE-2021-35646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
},
{
"name": "CVE-2021-35596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
},
{
"name": "CVE-2021-35643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
},
{
"name": "CVE-2021-35637",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
},
{
"name": "CVE-2021-35623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
},
{
"name": "CVE-2021-35632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
},
{
"name": "CVE-2021-35641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
},
{
"name": "CVE-2021-35604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
},
{
"name": "CVE-2021-35636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
},
{
"name": "CVE-2021-35546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
},
{
"name": "CVE-2021-35627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
},
{
"name": "CVE-2021-35625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
},
{
"name": "CVE-2021-35608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
},
{
"name": "CVE-2021-35597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
},
{
"name": "CVE-2021-35537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
},
{
"name": "CVE-2021-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
},
{
"name": "CVE-2021-35622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
},
{
"name": "CVE-2021-35610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
},
{
"name": "CVE-2021-35633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
},
{
"name": "CVE-2021-35634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
},
{
"name": "CVE-2021-35629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
},
{
"name": "CVE-2021-35631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
},
{
"name": "CVE-2021-35645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
},
{
"name": "CVE-2021-35647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
},
{
"name": "CVE-2021-35612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
},
{
"name": "CVE-2021-35639",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
},
{
"name": "CVE-2021-35648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
},
{
"name": "CVE-2021-35607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
},
{
"name": "CVE-2021-35602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
},
{
"name": "CVE-2021-35577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
},
{
"name": "CVE-2021-35642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
},
{
"name": "CVE-2021-35575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
},
{
"name": "CVE-2021-35635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
},
{
"name": "CVE-2021-35591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
},
{
"name": "CVE-2021-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
},
{
"name": "CVE-2021-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
},
{
"name": "CVE-2019-10744",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
},
{
"name": "CVE-2022-21352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2022-21254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
},
{
"name": "CVE-2022-21265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
},
{
"name": "CVE-2022-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
},
{
"name": "CVE-2022-21372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2022-21368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
},
{
"name": "CVE-2022-21339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
},
{
"name": "CVE-2022-21264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
},
{
"name": "CVE-2022-21297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
},
{
"name": "CVE-2022-21379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
},
{
"name": "CVE-2022-21253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
},
{
"name": "CVE-2022-21301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
},
{
"name": "CVE-2022-21378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
},
{
"name": "CVE-2022-21370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
},
{
"name": "CVE-2022-21302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
},
{
"name": "CVE-2022-21249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2022-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
},
{
"name": "CVE-2022-21362",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2022-21256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
},
{
"name": "CVE-2022-21358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
},
{
"name": "CVE-2022-21374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2020-8203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
},
{
"name": "CVE-2020-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
},
{
"name": "CVE-2022-22965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2022-21418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
},
{
"name": "CVE-2022-21412",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
},
{
"name": "CVE-2022-21437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
},
{
"name": "CVE-2022-21478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
},
{
"name": "CVE-2022-21479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
},
{
"name": "CVE-2022-21438",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
},
{
"name": "CVE-2022-21440",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
},
{
"name": "CVE-2022-21451",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
},
{
"name": "CVE-2022-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
},
{
"name": "CVE-2022-21415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
},
{
"name": "CVE-2022-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
},
{
"name": "CVE-2022-21460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
},
{
"name": "CVE-2022-21414",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
},
{
"name": "CVE-2022-21413",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
},
{
"name": "CVE-2022-21436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
},
{
"name": "CVE-2022-21435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
},
{
"name": "CVE-2022-21462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
},
{
"name": "CVE-2022-21444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
},
{
"name": "CVE-2022-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
},
{
"name": "CVE-2022-21457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
},
{
"name": "CVE-2022-21425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
},
{
"name": "CVE-2022-21452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2021-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2022-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
},
{
"name": "CVE-2022-21537",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
},
{
"name": "CVE-2022-21455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
},
{
"name": "CVE-2022-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
},
{
"name": "CVE-2022-21528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
},
{
"name": "CVE-2022-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
},
{
"name": "CVE-2022-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
},
{
"name": "CVE-2022-21515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
},
{
"name": "CVE-2022-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
},
{
"name": "CVE-2022-21527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
},
{
"name": "CVE-2022-21517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
},
{
"name": "CVE-2022-21539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
},
{
"name": "CVE-2022-21556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
},
{
"name": "CVE-2022-21509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
},
{
"name": "CVE-2022-21553",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
},
{
"name": "CVE-2022-21530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
},
{
"name": "CVE-2022-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
},
{
"name": "CVE-2022-21547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
},
{
"name": "CVE-2022-21569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
},
{
"name": "CVE-2022-21526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2022-0396",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-21592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
},
{
"name": "CVE-2022-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
},
{
"name": "CVE-2022-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
},
{
"name": "CVE-2022-21608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
},
{
"name": "CVE-2022-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
},
{
"name": "CVE-2023-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
},
{
"name": "CVE-2023-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
},
{
"name": "CVE-2023-21879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
},
{
"name": "CVE-2023-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
},
{
"name": "CVE-2023-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
},
{
"name": "CVE-2023-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
},
{
"name": "CVE-2023-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
},
{
"name": "CVE-2023-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
},
{
"name": "CVE-2023-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
},
{
"name": "CVE-2023-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
},
{
"name": "CVE-2023-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
},
{
"name": "CVE-2023-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
},
{
"name": "CVE-2023-21840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
},
{
"name": "CVE-2023-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
},
{
"name": "CVE-2023-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
},
{
"name": "CVE-2023-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
},
{
"name": "CVE-2023-21865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
},
{
"name": "CVE-2023-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
},
{
"name": "CVE-2023-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
},
{
"name": "CVE-2023-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
},
{
"name": "CVE-2023-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2023-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
},
{
"name": "CVE-2023-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2023-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
},
{
"name": "CVE-2023-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
},
{
"name": "CVE-2023-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-47100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2022-27772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2023-52572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2024-26739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2024-35866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
},
{
"name": "CVE-2024-35867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
},
{
"name": "CVE-2024-35943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2024-27402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2022-48893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2023-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2024-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2024-46774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2022-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2024-10487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
},
{
"name": "CVE-2024-10458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
},
{
"name": "CVE-2024-10459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
},
{
"name": "CVE-2024-10460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
},
{
"name": "CVE-2024-10461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
},
{
"name": "CVE-2024-10462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
},
{
"name": "CVE-2024-10463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
},
{
"name": "CVE-2024-10464",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
},
{
"name": "CVE-2024-10465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
},
{
"name": "CVE-2024-10466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
},
{
"name": "CVE-2024-10467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
},
{
"name": "CVE-2024-10468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2024-46816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
},
{
"name": "CVE-2024-11395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2024-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
},
{
"name": "CVE-2024-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
},
{
"name": "CVE-2024-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
},
{
"name": "CVE-2024-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
},
{
"name": "CVE-2024-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
},
{
"name": "CVE-2024-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
},
{
"name": "CVE-2024-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
},
{
"name": "CVE-2024-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
},
{
"name": "CVE-2024-11699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
},
{
"name": "CVE-2024-11700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
},
{
"name": "CVE-2024-11701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
},
{
"name": "CVE-2024-11702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
},
{
"name": "CVE-2024-11703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
},
{
"name": "CVE-2024-11704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
},
{
"name": "CVE-2024-11705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
},
{
"name": "CVE-2024-11706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
},
{
"name": "CVE-2024-11708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-49989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-0237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
},
{
"name": "CVE-2025-0238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
},
{
"name": "CVE-2025-0239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
},
{
"name": "CVE-2025-0240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
},
{
"name": "CVE-2025-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
},
{
"name": "CVE-2025-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
},
{
"name": "CVE-2025-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
},
{
"name": "CVE-2025-0245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
},
{
"name": "CVE-2025-0247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
},
{
"name": "CVE-2025-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
},
{
"name": "CVE-2025-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
},
{
"name": "CVE-2025-0436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
},
{
"name": "CVE-2025-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
},
{
"name": "CVE-2025-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
},
{
"name": "CVE-2025-0439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
},
{
"name": "CVE-2025-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
},
{
"name": "CVE-2025-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
},
{
"name": "CVE-2025-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
},
{
"name": "CVE-2025-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
},
{
"name": "CVE-2025-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
},
{
"name": "CVE-2025-0447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
},
{
"name": "CVE-2025-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
},
{
"name": "CVE-2025-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
},
{
"name": "CVE-2025-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
},
{
"name": "CVE-2025-0762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
},
{
"name": "CVE-2025-1009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
},
{
"name": "CVE-2025-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
},
{
"name": "CVE-2025-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
},
{
"name": "CVE-2025-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
},
{
"name": "CVE-2025-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
},
{
"name": "CVE-2025-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
},
{
"name": "CVE-2025-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
},
{
"name": "CVE-2025-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
},
{
"name": "CVE-2025-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
},
{
"name": "CVE-2025-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2024-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
},
{
"name": "CVE-2024-53203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
},
{
"name": "CVE-2024-53128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
},
{
"name": "CVE-2025-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
},
{
"name": "CVE-2025-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
},
{
"name": "CVE-2025-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
},
{
"name": "CVE-2025-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
},
{
"name": "CVE-2025-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
},
{
"name": "CVE-2025-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
},
{
"name": "CVE-2025-1426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
},
{
"name": "CVE-2024-56751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
},
{
"name": "CVE-2023-39017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-1914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
},
{
"name": "CVE-2025-1915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
},
{
"name": "CVE-2025-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
},
{
"name": "CVE-2025-1917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
},
{
"name": "CVE-2025-1918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
},
{
"name": "CVE-2025-1919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
},
{
"name": "CVE-2025-1921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
},
{
"name": "CVE-2025-1922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
},
{
"name": "CVE-2025-1923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
},
{
"name": "CVE-2025-1930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
},
{
"name": "CVE-2025-1931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
},
{
"name": "CVE-2025-1932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
},
{
"name": "CVE-2025-1933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
},
{
"name": "CVE-2025-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
},
{
"name": "CVE-2025-1935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
},
{
"name": "CVE-2025-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
},
{
"name": "CVE-2025-1937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
},
{
"name": "CVE-2025-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
},
{
"name": "CVE-2025-1939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
},
{
"name": "CVE-2025-1940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
},
{
"name": "CVE-2025-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
},
{
"name": "CVE-2025-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
},
{
"name": "CVE-2025-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
},
{
"name": "CVE-2025-1920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
},
{
"name": "CVE-2025-2135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
},
{
"name": "CVE-2025-2136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
},
{
"name": "CVE-2025-2137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-45772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
},
{
"name": "CVE-2025-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
},
{
"name": "CVE-2025-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2022-49535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2025-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
},
{
"name": "CVE-2025-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
},
{
"name": "CVE-2025-3068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
},
{
"name": "CVE-2025-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
},
{
"name": "CVE-2025-3072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
},
{
"name": "CVE-2025-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
},
{
"name": "CVE-2025-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
},
{
"name": "CVE-2025-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
},
{
"name": "CVE-2025-3029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
},
{
"name": "CVE-2025-3030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
},
{
"name": "CVE-2025-3031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
},
{
"name": "CVE-2025-3032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
},
{
"name": "CVE-2025-3033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
},
{
"name": "CVE-2025-3034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
},
{
"name": "CVE-2025-3035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2025-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2025-21588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
},
{
"name": "CVE-2025-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-4050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
},
{
"name": "CVE-2025-4051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
},
{
"name": "CVE-2025-4052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
},
{
"name": "CVE-2025-4096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
},
{
"name": "CVE-2025-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
},
{
"name": "CVE-2025-4082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
},
{
"name": "CVE-2025-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
},
{
"name": "CVE-2025-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
},
{
"name": "CVE-2025-4087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
},
{
"name": "CVE-2025-4088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
},
{
"name": "CVE-2025-4089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
},
{
"name": "CVE-2025-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
},
{
"name": "CVE-2025-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
},
{
"name": "CVE-2025-4092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2024-46742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2025-22027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-37838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-29087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
},
{
"name": "CVE-2025-3277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
},
{
"name": "CVE-2025-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
},
{
"name": "CVE-2025-4664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
},
{
"name": "CVE-2025-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-4918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
},
{
"name": "CVE-2025-4919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2025-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
},
{
"name": "CVE-2025-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
},
{
"name": "CVE-2025-5065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
},
{
"name": "CVE-2025-5066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
},
{
"name": "CVE-2025-5067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2025-22062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-5263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
},
{
"name": "CVE-2025-5264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
},
{
"name": "CVE-2025-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
},
{
"name": "CVE-2025-5266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
},
{
"name": "CVE-2025-5267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
},
{
"name": "CVE-2025-5268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
},
{
"name": "CVE-2025-5270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
},
{
"name": "CVE-2025-5271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
},
{
"name": "CVE-2025-5272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
},
{
"name": "CVE-2025-5281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-37964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
},
{
"name": "CVE-2025-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-49709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
},
{
"name": "CVE-2025-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-5958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
},
{
"name": "CVE-2025-5959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-6191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
},
{
"name": "CVE-2025-6192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2022-49168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2025-6424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
},
{
"name": "CVE-2025-6425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
},
{
"name": "CVE-2025-6426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
},
{
"name": "CVE-2025-6427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
},
{
"name": "CVE-2025-6429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
},
{
"name": "CVE-2025-6430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
},
{
"name": "CVE-2025-6432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
},
{
"name": "CVE-2025-6433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
},
{
"name": "CVE-2025-6434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-6555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
},
{
"name": "CVE-2025-6556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
},
{
"name": "CVE-2025-6557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
},
{
"name": "CVE-2025-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
},
{
"name": "CVE-2025-6436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
},
{
"name": "CVE-2025-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
},
{
"name": "CVE-2025-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
},
{
"name": "CVE-2025-7657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2022-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-8010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
},
{
"name": "CVE-2025-8011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
},
{
"name": "CVE-2025-8027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
},
{
"name": "CVE-2025-8028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
},
{
"name": "CVE-2025-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
},
{
"name": "CVE-2025-8030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
},
{
"name": "CVE-2025-8031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
},
{
"name": "CVE-2025-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
},
{
"name": "CVE-2025-8033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
},
{
"name": "CVE-2025-8034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
},
{
"name": "CVE-2025-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
},
{
"name": "CVE-2025-8036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
},
{
"name": "CVE-2025-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
},
{
"name": "CVE-2025-8038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
},
{
"name": "CVE-2025-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
},
{
"name": "CVE-2025-8040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
},
{
"name": "CVE-2025-8041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
},
{
"name": "CVE-2025-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
},
{
"name": "CVE-2025-8044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-8292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-8576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
},
{
"name": "CVE-2025-8577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
},
{
"name": "CVE-2025-8578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
},
{
"name": "CVE-2025-8579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
},
{
"name": "CVE-2025-8580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
},
{
"name": "CVE-2025-8581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
},
{
"name": "CVE-2025-8582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
},
{
"name": "CVE-2025-8583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2025-8879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
},
{
"name": "CVE-2025-8880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
},
{
"name": "CVE-2025-8881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
},
{
"name": "CVE-2025-8882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
},
{
"name": "CVE-2025-8901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-9132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2005-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
},
{
"name": "CVE-2008-5727",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
},
{
"name": "CVE-2008-5728",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
},
{
"name": "CVE-2008-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
},
{
"name": "CVE-2008-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
},
{
"name": "CVE-2008-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2015-2214",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2016-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
},
{
"name": "CVE-2016-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2017-12195",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
},
{
"name": "CVE-2017-12629",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2018-1000169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
},
{
"name": "CVE-2018-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
},
{
"name": "CVE-2018-1273",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2019-9658",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2021-20298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
},
{
"name": "CVE-2021-20304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
},
{
"name": "CVE-2021-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
},
{
"name": "CVE-2021-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
},
{
"name": "CVE-2021-3236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
},
{
"name": "CVE-2022-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
},
{
"name": "CVE-2022-0667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2023-4320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
},
{
"name": "CVE-2023-43785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
},
{
"name": "CVE-2023-43786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
},
{
"name": "CVE-2023-43787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
},
{
"name": "CVE-2023-46129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2023-5189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2024-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
},
{
"name": "CVE-2024-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-31047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2024-7012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-8262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-9179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
},
{
"name": "CVE-2025-9180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
},
{
"name": "CVE-2025-9181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
},
{
"name": "CVE-2025-9182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
},
{
"name": "CVE-2025-9183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
},
{
"name": "CVE-2025-9184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
},
{
"name": "CVE-2025-9185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
},
{
"name": "CVE-2025-9187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
},
{
"name": "CVE-2025-9308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
}
],
"initial_release_date": "2025-09-05T00:00:00",
"last_revision_date": "2025-09-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0756",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
}
]
}
CERTFR-2025-AVI-0947
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling Connect:Direct | Sterling Connect:Direct versions 6.2.x antérieures à 6.2.0.9.iFix005 pour Unix | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct versions 6.4.x antérieures à 6.4.0.2.iFix004 pour Unix | ||
| IBM | QRadar | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP14 | ||
| IBM | QRadar Hub | Qradar Hub versions antérieures à 3.9.0 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct versions 6.3.x antérieures à 6.3.0.5.iFix008 pour Unix | ||
| IBM | QRadar | QRadar Incident Forensics versions 7.5.x antérieures à 7.5.0 UP14 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sterling Connect:Direct versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.9.iFix005 pour Unix",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct versions 6.4.x ant\u00e9rieures \u00e0 6.4.0.2.iFix004 pour Unix",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP14",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Qradar Hub versions ant\u00e9rieures \u00e0 3.9.0",
"product": {
"name": "QRadar Hub",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.5.iFix008 pour Unix",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Incident Forensics versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP14",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2025-54389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54389"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2022-26336",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26336"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2023-45145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45145"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-36007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36007"
},
{
"name": "CVE-2012-0868",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0868"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2024-21096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21096"
},
{
"name": "CVE-2019-10130",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10130"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-36137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36137"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2017-7484",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7484"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
}
],
"initial_release_date": "2025-10-31T00:00:00",
"last_revision_date": "2025-10-31T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0947",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-31T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-10-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7249678",
"url": "https://www.ibm.com/support/pages/node/7249678"
},
{
"published_at": "2025-10-27",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7249277",
"url": "https://www.ibm.com/support/pages/node/7249277"
},
{
"published_at": "2025-10-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7249661",
"url": "https://www.ibm.com/support/pages/node/7249661"
},
{
"published_at": "2025-10-27",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7249276",
"url": "https://www.ibm.com/support/pages/node/7249276"
}
]
}
CERTFR-2025-AVI-0864
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMWare Tanzu pour MySQL sur Kubernetes 2.0.0 toutes version",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-21171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21171"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2024-20977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20977"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2024-20985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20985"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-21160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21160"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2024-21052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21052"
},
{
"name": "CVE-2024-20964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20964"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"name": "CVE-2024-21053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21053"
},
{
"name": "CVE-2024-21142",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21142"
},
{
"name": "CVE-2025-21494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21494"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2024-20976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20976"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"name": "CVE-2024-21200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21200"
},
{
"name": "CVE-2024-20998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20998"
},
{
"name": "CVE-2024-21231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21231"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21102"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-21049",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21049"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21534"
},
{
"name": "CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-21157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21157"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-21015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21015"
},
{
"name": "CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2024-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21166"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2023-45918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45918"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2024-20962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20962"
},
{
"name": "CVE-2022-48565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48565"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2025-21521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21521"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-21009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21009"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-20969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20969"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21177"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2025-21492",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21492"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-22112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22112"
},
{
"name": "CVE-2024-20966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20966"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-20972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20972"
},
{
"name": "CVE-2024-21159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21159"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21179"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21050"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-48566",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48566"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2024-20961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20961"
},
{
"name": "CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-20996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20996"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-20983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20983"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2024-21237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21237"
},
{
"name": "CVE-2025-21536",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21536"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21127"
},
{
"name": "CVE-2024-21134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21134"
},
{
"name": "CVE-2024-21000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21000"
},
{
"name": "CVE-2024-20984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20984"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21130"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-21057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21057"
},
{
"name": "CVE-2025-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21525"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-21135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21135"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-20963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20963"
},
{
"name": "CVE-2024-21096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21096"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-21062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21062"
},
{
"name": "CVE-2024-21055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21055"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2024-21165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21165"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-21056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21056"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-21047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21047"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-20981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20981"
},
{
"name": "CVE-2024-21185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21185"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-21013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21013"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2016-20013",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20013"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2024-21162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21162"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-22092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22092"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21060"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"name": "CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"name": "CVE-2025-21504",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21504"
},
{
"name": "CVE-2024-20974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20974"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2024-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21125"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-21518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21518"
},
{
"name": "CVE-2024-20993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20993"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2024-21129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21129"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2024-20982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20982"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2024-21087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21087"
},
{
"name": "CVE-2023-22064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22064"
},
{
"name": "CVE-2024-20971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20971"
},
{
"name": "CVE-2024-20978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20978"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-20973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20973"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-20965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20965"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2023-39804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39804"
},
{
"name": "CVE-2024-21061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21061"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-20967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20967"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-21163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21163"
},
{
"name": "CVE-2024-21069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21069"
},
{
"name": "CVE-2024-21051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21051"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-20970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20970"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-21054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21054"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"name": "CVE-2024-21230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21230"
},
{
"name": "CVE-2024-20968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20968"
},
{
"name": "CVE-2024-21173",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21173"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-21008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21008"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20994"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2023-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22079"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-20960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20960"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
}
],
"initial_release_date": "2025-10-13T00:00:00",
"last_revision_date": "2025-10-13T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0864",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36208",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36208"
}
]
}
CERTFR-2025-AVI-0791
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Apple indique que la vulnérabilité CVE-2025-43300 est activement exploitée.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | iPadOS | iPadOS versions antérieures à 26 | ||
| Apple | watchOS | watchOS versions antérieures à 26 | ||
| Apple | iOS | iOS versions 16.x antérieures à 16.7.12 | ||
| Apple | macOS | macOS Sonoma versions antérieures à 14.8 | ||
| Apple | tvOS | tvOS versions antérieures à 26 | ||
| Apple | macOS | macOS Sequoia versions antérieures à 15.7 | ||
| Apple | iOS | iOS versions antérieures à 26 | ||
| Apple | iOS | iOS versions 15.x antérieures à 15.8.5 | ||
| Apple | iOS | iOS versions 18.x antérieures à 18.7 | ||
| Apple | visionOS | visionOS versions antérieures à 26 | ||
| Apple | Xcode | Xcode versions antérieures à 26 | ||
| Apple | Safari | Safari versions antérieures à 26 | ||
| Apple | iPadOS | iPadOS versions 15.x antérieures à 15.8.5 | ||
| Apple | iPadOS | iPadOS versions 16.x antérieures à 16.7.12 | ||
| Apple | macOS | macOS Tahoe versions antérieures à 26 | ||
| Apple | iPadOS | iPadOS versions 18.x antérieures à 18.7 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "iPadOS versions ant\u00e9rieures \u00e0 26",
"product": {
"name": "iPadOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "watchOS versions ant\u00e9rieures \u00e0 26",
"product": {
"name": "watchOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions 16.x ant\u00e9rieures \u00e0 16.7.12",
"product": {
"name": "iOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sonoma versions ant\u00e9rieures \u00e0 14.8",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 26",
"product": {
"name": "tvOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sequoia versions ant\u00e9rieures \u00e0 15.7",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 26",
"product": {
"name": "iOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions 15.x ant\u00e9rieures \u00e0 15.8.5",
"product": {
"name": "iOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions 18.x ant\u00e9rieures \u00e0 18.7",
"product": {
"name": "iOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "visionOS versions ant\u00e9rieures \u00e0 26",
"product": {
"name": "visionOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Xcode versions ant\u00e9rieures \u00e0 26",
"product": {
"name": "Xcode",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 26",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS versions 15.x ant\u00e9rieures \u00e0 15.8.5",
"product": {
"name": "iPadOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS versions 16.x ant\u00e9rieures \u00e0 16.7.12",
"product": {
"name": "iPadOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Tahoe versions ant\u00e9rieures \u00e0 26",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS versions 18.x ant\u00e9rieures \u00e0 18.7",
"product": {
"name": "iPadOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-43292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43292"
},
{
"name": "CVE-2025-43372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43372"
},
{
"name": "CVE-2025-43332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43332"
},
{
"name": "CVE-2025-31270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31270"
},
{
"name": "CVE-2025-43362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43362"
},
{
"name": "CVE-2025-43319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43319"
},
{
"name": "CVE-2025-43340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43340"
},
{
"name": "CVE-2025-43327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43327"
},
{
"name": "CVE-2025-30468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30468"
},
{
"name": "CVE-2025-43359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43359"
},
{
"name": "CVE-2025-43262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43262"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-31269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31269"
},
{
"name": "CVE-2025-43354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43354"
},
{
"name": "CVE-2025-43326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43326"
},
{
"name": "CVE-2025-43204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43204"
},
{
"name": "CVE-2025-43273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43273"
},
{
"name": "CVE-2025-43347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43347"
},
{
"name": "CVE-2025-43302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43302"
},
{
"name": "CVE-2025-43321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43321"
},
{
"name": "CVE-2025-31254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31254"
},
{
"name": "CVE-2025-43299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43299"
},
{
"name": "CVE-2025-43316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43316"
},
{
"name": "CVE-2025-43263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43263"
},
{
"name": "CVE-2025-31255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31255"
},
{
"name": "CVE-2025-43375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43375"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-43355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43355"
},
{
"name": "CVE-2025-43207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43207"
},
{
"name": "CVE-2025-43285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43285"
},
{
"name": "CVE-2025-43370",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43370"
},
{
"name": "CVE-2025-43312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43312"
},
{
"name": "CVE-2025-43317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43317"
},
{
"name": "CVE-2025-31271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31271"
},
{
"name": "CVE-2025-43208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43208"
},
{
"name": "CVE-2025-43283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43283"
},
{
"name": "CVE-2025-48384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48384"
},
{
"name": "CVE-2025-43277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43277"
},
{
"name": "CVE-2025-43325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43325"
},
{
"name": "CVE-2025-43231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43231"
},
{
"name": "CVE-2025-24197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24197"
},
{
"name": "CVE-2025-43358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43358"
},
{
"name": "CVE-2025-43328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43328"
},
{
"name": "CVE-2025-43368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43368"
},
{
"name": "CVE-2025-43315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43315"
},
{
"name": "CVE-2025-43331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43331"
},
{
"name": "CVE-2025-43310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43310"
},
{
"name": "CVE-2025-43333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43333"
},
{
"name": "CVE-2025-43203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43203"
},
{
"name": "CVE-2025-43307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43307"
},
{
"name": "CVE-2025-43297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43297"
},
{
"name": "CVE-2025-43190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43190"
},
{
"name": "CVE-2025-24088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24088"
},
{
"name": "CVE-2025-43293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43293"
},
{
"name": "CVE-2025-43343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43343"
},
{
"name": "CVE-2025-43294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43294"
},
{
"name": "CVE-2025-43286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43286"
},
{
"name": "CVE-2025-43353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43353"
},
{
"name": "CVE-2025-43356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43356"
},
{
"name": "CVE-2025-43330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43330"
},
{
"name": "CVE-2025-43272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43272"
},
{
"name": "CVE-2025-31259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31259"
},
{
"name": "CVE-2025-31268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31268"
},
{
"name": "CVE-2025-43366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43366"
},
{
"name": "CVE-2025-43298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43298"
},
{
"name": "CVE-2025-43369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43369"
},
{
"name": "CVE-2025-43308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43308"
},
{
"name": "CVE-2025-43346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43346"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-43337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43337"
},
{
"name": "CVE-2025-24133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24133"
},
{
"name": "CVE-2025-43279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43279"
},
{
"name": "CVE-2025-43314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43314"
},
{
"name": "CVE-2025-43300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43300"
},
{
"name": "CVE-2025-43342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43342"
},
{
"name": "CVE-2025-43349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43349"
},
{
"name": "CVE-2025-43341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43341"
},
{
"name": "CVE-2025-43301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43301"
},
{
"name": "CVE-2025-43318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43318"
},
{
"name": "CVE-2025-43344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43344"
},
{
"name": "CVE-2025-43311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43311"
},
{
"name": "CVE-2025-43287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43287"
},
{
"name": "CVE-2025-43303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43303"
},
{
"name": "CVE-2025-43304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43304"
},
{
"name": "CVE-2025-43291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43291"
},
{
"name": "CVE-2025-43329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43329"
},
{
"name": "CVE-2025-43357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43357"
},
{
"name": "CVE-2025-43367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43367"
},
{
"name": "CVE-2025-43371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43371"
},
{
"name": "CVE-2025-43295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43295"
},
{
"name": "CVE-2025-43305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43305"
}
],
"initial_release_date": "2025-09-16T00:00:00",
"last_revision_date": "2025-09-16T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0791",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n\nApple indique que la vuln\u00e9rabilit\u00e9 CVE-2025-43300 est activement exploit\u00e9e.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125112",
"url": "https://support.apple.com/en-us/125112"
},
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125116",
"url": "https://support.apple.com/en-us/125116"
},
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125110",
"url": "https://support.apple.com/en-us/125110"
},
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125115",
"url": "https://support.apple.com/en-us/125115"
},
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125141",
"url": "https://support.apple.com/en-us/125141"
},
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125117",
"url": "https://support.apple.com/en-us/125117"
},
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125114",
"url": "https://support.apple.com/en-us/125114"
},
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125108",
"url": "https://support.apple.com/en-us/125108"
},
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125111",
"url": "https://support.apple.com/en-us/125111"
},
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125109",
"url": "https://support.apple.com/en-us/125109"
},
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125142",
"url": "https://support.apple.com/en-us/125142"
},
{
"published_at": "2025-09-15",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 125113",
"url": "https://support.apple.com/en-us/125113"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
rhsa-2025:11804
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for perl is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Perl is a high-level programming language that is commonly used for system administration utilities and web programming.\n\nSecurity Fix(es):\n\n* perl: Perl threads have a working directory race condition where file operations may target unintended paths (CVE-2025-40909)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:11804",
"url": "https://access.redhat.com/errata/RHSA-2025:11804"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2369407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369407"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_11804.json"
}
],
"title": "Red Hat Security Advisory: perl security update",
"tracking": {
"current_release_date": "2025-11-06T23:14:31+00:00",
"generator": {
"date": "2025-11-06T23:14:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2025:11804",
"initial_release_date": "2025-07-28T02:32:35+00:00",
"revision_history": [
{
"date": "2025-07-28T02:32:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-28T02:32:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:14:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-4:5.32.1-481.1.el9_6.src",
"product": {
"name": "perl-4:5.32.1-481.1.el9_6.src",
"product_id": "perl-4:5.32.1-481.1.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl@5.32.1-481.1.el9_6?arch=src\u0026epoch=4"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-4:5.32.1-481.1.el9_6.aarch64",
"product": {
"name": "perl-4:5.32.1-481.1.el9_6.aarch64",
"product_id": "perl-4:5.32.1-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl@5.32.1-481.1.el9_6?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-0:1.80-481.1.el9_6.aarch64",
"product": {
"name": "perl-B-0:1.80-481.1.el9_6.aarch64",
"product_id": "perl-B-0:1.80-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B@1.80-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-0:1.28-481.1.el9_6.aarch64",
"product": {
"name": "perl-Devel-Peek-0:1.28-481.1.el9_6.aarch64",
"product_id": "perl-Devel-Peek-0:1.28-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek@1.28-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-DynaLoader-0:1.47-481.1.el9_6.aarch64",
"product": {
"name": "perl-DynaLoader-0:1.47-481.1.el9_6.aarch64",
"product_id": "perl-DynaLoader-0:1.47-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-DynaLoader@1.47-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Errno-0:1.30-481.1.el9_6.aarch64",
"product": {
"name": "perl-Errno-0:1.30-481.1.el9_6.aarch64",
"product_id": "perl-Errno-0:1.30-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Errno@1.30-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-0:1.13-481.1.el9_6.aarch64",
"product": {
"name": "perl-Fcntl-0:1.13-481.1.el9_6.aarch64",
"product_id": "perl-Fcntl-0:1.13-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl@1.13-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-0:1.12-481.1.el9_6.aarch64",
"product": {
"name": "perl-File-DosGlob-0:1.12-481.1.el9_6.aarch64",
"product_id": "perl-File-DosGlob-0:1.12-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob@1.12-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-0:1.18-481.1.el9_6.aarch64",
"product": {
"name": "perl-GDBM_File-0:1.18-481.1.el9_6.aarch64",
"product_id": "perl-GDBM_File-0:1.18-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File@1.18-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-0:0.23-481.1.el9_6.aarch64",
"product": {
"name": "perl-Hash-Util-0:0.23-481.1.el9_6.aarch64",
"product_id": "perl-Hash-Util-0:0.23-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util@0.23-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.aarch64",
"product": {
"name": "perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.aarch64",
"product_id": "perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash@1.20-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-0:0.19-481.1.el9_6.aarch64",
"product": {
"name": "perl-I18N-Langinfo-0:0.19-481.1.el9_6.aarch64",
"product_id": "perl-I18N-Langinfo-0:0.19-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo@0.19-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-IO-0:1.43-481.1.el9_6.aarch64",
"product": {
"name": "perl-IO-0:1.43-481.1.el9_6.aarch64",
"product_id": "perl-IO-0:1.43-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO@1.43-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-0:1.15-481.1.el9_6.aarch64",
"product": {
"name": "perl-NDBM_File-0:1.15-481.1.el9_6.aarch64",
"product_id": "perl-NDBM_File-0:1.15-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File@1.15-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-0:1.16-481.1.el9_6.aarch64",
"product": {
"name": "perl-ODBM_File-0:1.16-481.1.el9_6.aarch64",
"product_id": "perl-ODBM_File-0:1.16-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File@1.16-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-0:1.48-481.1.el9_6.aarch64",
"product": {
"name": "perl-Opcode-0:1.48-481.1.el9_6.aarch64",
"product_id": "perl-Opcode-0:1.48-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode@1.48-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-0:1.94-481.1.el9_6.aarch64",
"product": {
"name": "perl-POSIX-0:1.94-481.1.el9_6.aarch64",
"product_id": "perl-POSIX-0:1.94-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX@1.94-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-0:1.23-481.1.el9_6.aarch64",
"product": {
"name": "perl-Sys-Hostname-0:1.23-481.1.el9_6.aarch64",
"product_id": "perl-Sys-Hostname-0:1.23-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname@1.23-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-0:1.3401-481.1.el9_6.aarch64",
"product": {
"name": "perl-Time-Piece-0:1.3401-481.1.el9_6.aarch64",
"product_id": "perl-Time-Piece-0:1.3401-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece@1.3401-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-devel-4:5.32.1-481.1.el9_6.aarch64",
"product": {
"name": "perl-devel-4:5.32.1-481.1.el9_6.aarch64",
"product_id": "perl-devel-4:5.32.1-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-devel@5.32.1-481.1.el9_6?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-4:5.32.1-481.1.el9_6.aarch64",
"product": {
"name": "perl-interpreter-4:5.32.1-481.1.el9_6.aarch64",
"product_id": "perl-interpreter-4:5.32.1-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter@5.32.1-481.1.el9_6?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-lib-0:0.65-481.1.el9_6.aarch64",
"product": {
"name": "perl-lib-0:0.65-481.1.el9_6.aarch64",
"product_id": "perl-lib-0:0.65-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-lib@0.65-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-libs-4:5.32.1-481.1.el9_6.aarch64",
"product": {
"name": "perl-libs-4:5.32.1-481.1.el9_6.aarch64",
"product_id": "perl-libs-4:5.32.1-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs@5.32.1-481.1.el9_6?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-0:1.23-481.1.el9_6.aarch64",
"product": {
"name": "perl-mro-0:1.23-481.1.el9_6.aarch64",
"product_id": "perl-mro-0:1.23-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro@1.23-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-ph-0:5.32.1-481.1.el9_6.aarch64",
"product": {
"name": "perl-ph-0:5.32.1-481.1.el9_6.aarch64",
"product_id": "perl-ph-0:5.32.1-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ph@5.32.1-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-debugsource-4:5.32.1-481.1.el9_6.aarch64",
"product": {
"name": "perl-debugsource-4:5.32.1-481.1.el9_6.aarch64",
"product_id": "perl-debugsource-4:5.32.1-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debugsource@5.32.1-481.1.el9_6?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-debuginfo-0:1.80-481.1.el9_6.aarch64",
"product": {
"name": "perl-B-debuginfo-0:1.80-481.1.el9_6.aarch64",
"product_id": "perl-B-debuginfo-0:1.80-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B-debuginfo@1.80-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.aarch64",
"product": {
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.aarch64",
"product_id": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek-debuginfo@1.28-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.aarch64",
"product": {
"name": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.aarch64",
"product_id": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl-debuginfo@1.13-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.aarch64",
"product": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.aarch64",
"product_id": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob-debuginfo@1.12-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.aarch64",
"product": {
"name": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.aarch64",
"product_id": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File-debuginfo@1.18-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.aarch64",
"product": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.aarch64",
"product_id": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash-debuginfo@1.20-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.aarch64",
"product": {
"name": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.aarch64",
"product_id": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-debuginfo@0.23-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.aarch64",
"product": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.aarch64",
"product_id": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo-debuginfo@0.19-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-IO-debuginfo-0:1.43-481.1.el9_6.aarch64",
"product": {
"name": "perl-IO-debuginfo-0:1.43-481.1.el9_6.aarch64",
"product_id": "perl-IO-debuginfo-0:1.43-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO-debuginfo@1.43-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.aarch64",
"product": {
"name": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.aarch64",
"product_id": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File-debuginfo@1.15-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.aarch64",
"product": {
"name": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.aarch64",
"product_id": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File-debuginfo@1.16-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.aarch64",
"product": {
"name": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.aarch64",
"product_id": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode-debuginfo@1.48-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.aarch64",
"product": {
"name": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.aarch64",
"product_id": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX-debuginfo@1.94-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.aarch64",
"product": {
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.aarch64",
"product_id": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname-debuginfo@1.23-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.aarch64",
"product": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.aarch64",
"product_id": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece-debuginfo@1.3401-481.1.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"product": {
"name": "perl-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"product_id": "perl-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debuginfo@5.32.1-481.1.el9_6?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"product": {
"name": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"product_id": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter-debuginfo@5.32.1-481.1.el9_6?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"product": {
"name": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"product_id": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs-debuginfo@5.32.1-481.1.el9_6?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-debuginfo-0:1.23-481.1.el9_6.aarch64",
"product": {
"name": "perl-mro-debuginfo-0:1.23-481.1.el9_6.aarch64",
"product_id": "perl-mro-debuginfo-0:1.23-481.1.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro-debuginfo@1.23-481.1.el9_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-4:5.32.1-481.1.el9_6.ppc64le",
"product": {
"name": "perl-4:5.32.1-481.1.el9_6.ppc64le",
"product_id": "perl-4:5.32.1-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl@5.32.1-481.1.el9_6?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-0:1.80-481.1.el9_6.ppc64le",
"product": {
"name": "perl-B-0:1.80-481.1.el9_6.ppc64le",
"product_id": "perl-B-0:1.80-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B@1.80-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-0:1.28-481.1.el9_6.ppc64le",
"product": {
"name": "perl-Devel-Peek-0:1.28-481.1.el9_6.ppc64le",
"product_id": "perl-Devel-Peek-0:1.28-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek@1.28-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-DynaLoader-0:1.47-481.1.el9_6.ppc64le",
"product": {
"name": "perl-DynaLoader-0:1.47-481.1.el9_6.ppc64le",
"product_id": "perl-DynaLoader-0:1.47-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-DynaLoader@1.47-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Errno-0:1.30-481.1.el9_6.ppc64le",
"product": {
"name": "perl-Errno-0:1.30-481.1.el9_6.ppc64le",
"product_id": "perl-Errno-0:1.30-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Errno@1.30-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-0:1.13-481.1.el9_6.ppc64le",
"product": {
"name": "perl-Fcntl-0:1.13-481.1.el9_6.ppc64le",
"product_id": "perl-Fcntl-0:1.13-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl@1.13-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-0:1.12-481.1.el9_6.ppc64le",
"product": {
"name": "perl-File-DosGlob-0:1.12-481.1.el9_6.ppc64le",
"product_id": "perl-File-DosGlob-0:1.12-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob@1.12-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-0:1.18-481.1.el9_6.ppc64le",
"product": {
"name": "perl-GDBM_File-0:1.18-481.1.el9_6.ppc64le",
"product_id": "perl-GDBM_File-0:1.18-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File@1.18-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-0:0.23-481.1.el9_6.ppc64le",
"product": {
"name": "perl-Hash-Util-0:0.23-481.1.el9_6.ppc64le",
"product_id": "perl-Hash-Util-0:0.23-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util@0.23-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.ppc64le",
"product": {
"name": "perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.ppc64le",
"product_id": "perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash@1.20-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-0:0.19-481.1.el9_6.ppc64le",
"product": {
"name": "perl-I18N-Langinfo-0:0.19-481.1.el9_6.ppc64le",
"product_id": "perl-I18N-Langinfo-0:0.19-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo@0.19-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-IO-0:1.43-481.1.el9_6.ppc64le",
"product": {
"name": "perl-IO-0:1.43-481.1.el9_6.ppc64le",
"product_id": "perl-IO-0:1.43-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO@1.43-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-0:1.15-481.1.el9_6.ppc64le",
"product": {
"name": "perl-NDBM_File-0:1.15-481.1.el9_6.ppc64le",
"product_id": "perl-NDBM_File-0:1.15-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File@1.15-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-0:1.16-481.1.el9_6.ppc64le",
"product": {
"name": "perl-ODBM_File-0:1.16-481.1.el9_6.ppc64le",
"product_id": "perl-ODBM_File-0:1.16-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File@1.16-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-0:1.48-481.1.el9_6.ppc64le",
"product": {
"name": "perl-Opcode-0:1.48-481.1.el9_6.ppc64le",
"product_id": "perl-Opcode-0:1.48-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode@1.48-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-0:1.94-481.1.el9_6.ppc64le",
"product": {
"name": "perl-POSIX-0:1.94-481.1.el9_6.ppc64le",
"product_id": "perl-POSIX-0:1.94-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX@1.94-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-0:1.23-481.1.el9_6.ppc64le",
"product": {
"name": "perl-Sys-Hostname-0:1.23-481.1.el9_6.ppc64le",
"product_id": "perl-Sys-Hostname-0:1.23-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname@1.23-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-0:1.3401-481.1.el9_6.ppc64le",
"product": {
"name": "perl-Time-Piece-0:1.3401-481.1.el9_6.ppc64le",
"product_id": "perl-Time-Piece-0:1.3401-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece@1.3401-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-devel-4:5.32.1-481.1.el9_6.ppc64le",
"product": {
"name": "perl-devel-4:5.32.1-481.1.el9_6.ppc64le",
"product_id": "perl-devel-4:5.32.1-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-devel@5.32.1-481.1.el9_6?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-4:5.32.1-481.1.el9_6.ppc64le",
"product": {
"name": "perl-interpreter-4:5.32.1-481.1.el9_6.ppc64le",
"product_id": "perl-interpreter-4:5.32.1-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter@5.32.1-481.1.el9_6?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-lib-0:0.65-481.1.el9_6.ppc64le",
"product": {
"name": "perl-lib-0:0.65-481.1.el9_6.ppc64le",
"product_id": "perl-lib-0:0.65-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-lib@0.65-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-libs-4:5.32.1-481.1.el9_6.ppc64le",
"product": {
"name": "perl-libs-4:5.32.1-481.1.el9_6.ppc64le",
"product_id": "perl-libs-4:5.32.1-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs@5.32.1-481.1.el9_6?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-0:1.23-481.1.el9_6.ppc64le",
"product": {
"name": "perl-mro-0:1.23-481.1.el9_6.ppc64le",
"product_id": "perl-mro-0:1.23-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro@1.23-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-ph-0:5.32.1-481.1.el9_6.ppc64le",
"product": {
"name": "perl-ph-0:5.32.1-481.1.el9_6.ppc64le",
"product_id": "perl-ph-0:5.32.1-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ph@5.32.1-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-debugsource-4:5.32.1-481.1.el9_6.ppc64le",
"product": {
"name": "perl-debugsource-4:5.32.1-481.1.el9_6.ppc64le",
"product_id": "perl-debugsource-4:5.32.1-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debugsource@5.32.1-481.1.el9_6?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-debuginfo-0:1.80-481.1.el9_6.ppc64le",
"product": {
"name": "perl-B-debuginfo-0:1.80-481.1.el9_6.ppc64le",
"product_id": "perl-B-debuginfo-0:1.80-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B-debuginfo@1.80-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.ppc64le",
"product": {
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.ppc64le",
"product_id": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek-debuginfo@1.28-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.ppc64le",
"product": {
"name": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.ppc64le",
"product_id": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl-debuginfo@1.13-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.ppc64le",
"product": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.ppc64le",
"product_id": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob-debuginfo@1.12-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.ppc64le",
"product": {
"name": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.ppc64le",
"product_id": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File-debuginfo@1.18-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.ppc64le",
"product": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.ppc64le",
"product_id": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash-debuginfo@1.20-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.ppc64le",
"product": {
"name": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.ppc64le",
"product_id": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-debuginfo@0.23-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.ppc64le",
"product": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.ppc64le",
"product_id": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo-debuginfo@0.19-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-IO-debuginfo-0:1.43-481.1.el9_6.ppc64le",
"product": {
"name": "perl-IO-debuginfo-0:1.43-481.1.el9_6.ppc64le",
"product_id": "perl-IO-debuginfo-0:1.43-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO-debuginfo@1.43-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.ppc64le",
"product": {
"name": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.ppc64le",
"product_id": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File-debuginfo@1.15-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.ppc64le",
"product": {
"name": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.ppc64le",
"product_id": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File-debuginfo@1.16-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.ppc64le",
"product": {
"name": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.ppc64le",
"product_id": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode-debuginfo@1.48-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.ppc64le",
"product": {
"name": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.ppc64le",
"product_id": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX-debuginfo@1.94-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.ppc64le",
"product": {
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.ppc64le",
"product_id": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname-debuginfo@1.23-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.ppc64le",
"product": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.ppc64le",
"product_id": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece-debuginfo@1.3401-481.1.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"product": {
"name": "perl-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"product_id": "perl-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debuginfo@5.32.1-481.1.el9_6?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"product": {
"name": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"product_id": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter-debuginfo@5.32.1-481.1.el9_6?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"product": {
"name": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"product_id": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs-debuginfo@5.32.1-481.1.el9_6?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-debuginfo-0:1.23-481.1.el9_6.ppc64le",
"product": {
"name": "perl-mro-debuginfo-0:1.23-481.1.el9_6.ppc64le",
"product_id": "perl-mro-debuginfo-0:1.23-481.1.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro-debuginfo@1.23-481.1.el9_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-4:5.32.1-481.1.el9_6.x86_64",
"product": {
"name": "perl-4:5.32.1-481.1.el9_6.x86_64",
"product_id": "perl-4:5.32.1-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl@5.32.1-481.1.el9_6?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-0:1.80-481.1.el9_6.x86_64",
"product": {
"name": "perl-B-0:1.80-481.1.el9_6.x86_64",
"product_id": "perl-B-0:1.80-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B@1.80-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-0:1.28-481.1.el9_6.x86_64",
"product": {
"name": "perl-Devel-Peek-0:1.28-481.1.el9_6.x86_64",
"product_id": "perl-Devel-Peek-0:1.28-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek@1.28-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-DynaLoader-0:1.47-481.1.el9_6.x86_64",
"product": {
"name": "perl-DynaLoader-0:1.47-481.1.el9_6.x86_64",
"product_id": "perl-DynaLoader-0:1.47-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-DynaLoader@1.47-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Errno-0:1.30-481.1.el9_6.x86_64",
"product": {
"name": "perl-Errno-0:1.30-481.1.el9_6.x86_64",
"product_id": "perl-Errno-0:1.30-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Errno@1.30-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-0:1.13-481.1.el9_6.x86_64",
"product": {
"name": "perl-Fcntl-0:1.13-481.1.el9_6.x86_64",
"product_id": "perl-Fcntl-0:1.13-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl@1.13-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-0:1.12-481.1.el9_6.x86_64",
"product": {
"name": "perl-File-DosGlob-0:1.12-481.1.el9_6.x86_64",
"product_id": "perl-File-DosGlob-0:1.12-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob@1.12-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-0:1.18-481.1.el9_6.x86_64",
"product": {
"name": "perl-GDBM_File-0:1.18-481.1.el9_6.x86_64",
"product_id": "perl-GDBM_File-0:1.18-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File@1.18-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-0:0.23-481.1.el9_6.x86_64",
"product": {
"name": "perl-Hash-Util-0:0.23-481.1.el9_6.x86_64",
"product_id": "perl-Hash-Util-0:0.23-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util@0.23-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.x86_64",
"product": {
"name": "perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.x86_64",
"product_id": "perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash@1.20-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-0:0.19-481.1.el9_6.x86_64",
"product": {
"name": "perl-I18N-Langinfo-0:0.19-481.1.el9_6.x86_64",
"product_id": "perl-I18N-Langinfo-0:0.19-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo@0.19-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-IO-0:1.43-481.1.el9_6.x86_64",
"product": {
"name": "perl-IO-0:1.43-481.1.el9_6.x86_64",
"product_id": "perl-IO-0:1.43-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO@1.43-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-0:1.15-481.1.el9_6.x86_64",
"product": {
"name": "perl-NDBM_File-0:1.15-481.1.el9_6.x86_64",
"product_id": "perl-NDBM_File-0:1.15-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File@1.15-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-0:1.16-481.1.el9_6.x86_64",
"product": {
"name": "perl-ODBM_File-0:1.16-481.1.el9_6.x86_64",
"product_id": "perl-ODBM_File-0:1.16-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File@1.16-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-0:1.48-481.1.el9_6.x86_64",
"product": {
"name": "perl-Opcode-0:1.48-481.1.el9_6.x86_64",
"product_id": "perl-Opcode-0:1.48-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode@1.48-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-0:1.94-481.1.el9_6.x86_64",
"product": {
"name": "perl-POSIX-0:1.94-481.1.el9_6.x86_64",
"product_id": "perl-POSIX-0:1.94-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX@1.94-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-0:1.23-481.1.el9_6.x86_64",
"product": {
"name": "perl-Sys-Hostname-0:1.23-481.1.el9_6.x86_64",
"product_id": "perl-Sys-Hostname-0:1.23-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname@1.23-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-0:1.3401-481.1.el9_6.x86_64",
"product": {
"name": "perl-Time-Piece-0:1.3401-481.1.el9_6.x86_64",
"product_id": "perl-Time-Piece-0:1.3401-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece@1.3401-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-devel-4:5.32.1-481.1.el9_6.x86_64",
"product": {
"name": "perl-devel-4:5.32.1-481.1.el9_6.x86_64",
"product_id": "perl-devel-4:5.32.1-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-devel@5.32.1-481.1.el9_6?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-4:5.32.1-481.1.el9_6.x86_64",
"product": {
"name": "perl-interpreter-4:5.32.1-481.1.el9_6.x86_64",
"product_id": "perl-interpreter-4:5.32.1-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter@5.32.1-481.1.el9_6?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-lib-0:0.65-481.1.el9_6.x86_64",
"product": {
"name": "perl-lib-0:0.65-481.1.el9_6.x86_64",
"product_id": "perl-lib-0:0.65-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-lib@0.65-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-libs-4:5.32.1-481.1.el9_6.x86_64",
"product": {
"name": "perl-libs-4:5.32.1-481.1.el9_6.x86_64",
"product_id": "perl-libs-4:5.32.1-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs@5.32.1-481.1.el9_6?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-0:1.23-481.1.el9_6.x86_64",
"product": {
"name": "perl-mro-0:1.23-481.1.el9_6.x86_64",
"product_id": "perl-mro-0:1.23-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro@1.23-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-ph-0:5.32.1-481.1.el9_6.x86_64",
"product": {
"name": "perl-ph-0:5.32.1-481.1.el9_6.x86_64",
"product_id": "perl-ph-0:5.32.1-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ph@5.32.1-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-debugsource-4:5.32.1-481.1.el9_6.x86_64",
"product": {
"name": "perl-debugsource-4:5.32.1-481.1.el9_6.x86_64",
"product_id": "perl-debugsource-4:5.32.1-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debugsource@5.32.1-481.1.el9_6?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-debuginfo-0:1.80-481.1.el9_6.x86_64",
"product": {
"name": "perl-B-debuginfo-0:1.80-481.1.el9_6.x86_64",
"product_id": "perl-B-debuginfo-0:1.80-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B-debuginfo@1.80-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.x86_64",
"product": {
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.x86_64",
"product_id": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek-debuginfo@1.28-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.x86_64",
"product": {
"name": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.x86_64",
"product_id": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl-debuginfo@1.13-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.x86_64",
"product": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.x86_64",
"product_id": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob-debuginfo@1.12-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.x86_64",
"product": {
"name": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.x86_64",
"product_id": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File-debuginfo@1.18-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.x86_64",
"product": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.x86_64",
"product_id": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash-debuginfo@1.20-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.x86_64",
"product": {
"name": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.x86_64",
"product_id": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-debuginfo@0.23-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.x86_64",
"product": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.x86_64",
"product_id": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo-debuginfo@0.19-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-IO-debuginfo-0:1.43-481.1.el9_6.x86_64",
"product": {
"name": "perl-IO-debuginfo-0:1.43-481.1.el9_6.x86_64",
"product_id": "perl-IO-debuginfo-0:1.43-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO-debuginfo@1.43-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.x86_64",
"product": {
"name": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.x86_64",
"product_id": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File-debuginfo@1.15-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.x86_64",
"product": {
"name": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.x86_64",
"product_id": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File-debuginfo@1.16-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.x86_64",
"product": {
"name": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.x86_64",
"product_id": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode-debuginfo@1.48-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.x86_64",
"product": {
"name": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.x86_64",
"product_id": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX-debuginfo@1.94-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.x86_64",
"product": {
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.x86_64",
"product_id": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname-debuginfo@1.23-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.x86_64",
"product": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.x86_64",
"product_id": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece-debuginfo@1.3401-481.1.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"product": {
"name": "perl-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"product_id": "perl-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debuginfo@5.32.1-481.1.el9_6?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"product": {
"name": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"product_id": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter-debuginfo@5.32.1-481.1.el9_6?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"product": {
"name": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"product_id": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs-debuginfo@5.32.1-481.1.el9_6?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-debuginfo-0:1.23-481.1.el9_6.x86_64",
"product": {
"name": "perl-mro-debuginfo-0:1.23-481.1.el9_6.x86_64",
"product_id": "perl-mro-debuginfo-0:1.23-481.1.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro-debuginfo@1.23-481.1.el9_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-devel-4:5.32.1-481.1.el9_6.i686",
"product": {
"name": "perl-devel-4:5.32.1-481.1.el9_6.i686",
"product_id": "perl-devel-4:5.32.1-481.1.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-devel@5.32.1-481.1.el9_6?arch=i686\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-4:5.32.1-481.1.el9_6.i686",
"product": {
"name": "perl-libs-4:5.32.1-481.1.el9_6.i686",
"product_id": "perl-libs-4:5.32.1-481.1.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs@5.32.1-481.1.el9_6?arch=i686\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-debugsource-4:5.32.1-481.1.el9_6.i686",
"product": {
"name": "perl-debugsource-4:5.32.1-481.1.el9_6.i686",
"product_id": "perl-debugsource-4:5.32.1-481.1.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debugsource@5.32.1-481.1.el9_6?arch=i686\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-debuginfo-0:1.80-481.1.el9_6.i686",
"product": {
"name": "perl-B-debuginfo-0:1.80-481.1.el9_6.i686",
"product_id": "perl-B-debuginfo-0:1.80-481.1.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B-debuginfo@1.80-481.1.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.i686",
"product": {
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.i686",
"product_id": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek-debuginfo@1.28-481.1.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.i686",
"product": {
"name": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.i686",
"product_id": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl-debuginfo@1.13-481.1.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.i686",
"product": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.i686",
"product_id": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob-debuginfo@1.12-481.1.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.i686",
"product": {
"name": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.i686",
"product_id": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File-debuginfo@1.18-481.1.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.i686",
"product": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.i686",
"product_id": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash-debuginfo@1.20-481.1.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.i686",
"product": {
"name": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.i686",
"product_id": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-debuginfo@0.23-481.1.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.i686",
"product": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.i686",
"product_id": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo-debuginfo@0.19-481.1.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-IO-debuginfo-0:1.43-481.1.el9_6.i686",
"product": {
"name": "perl-IO-debuginfo-0:1.43-481.1.el9_6.i686",
"product_id": "perl-IO-debuginfo-0:1.43-481.1.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO-debuginfo@1.43-481.1.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.i686",
"product": {
"name": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.i686",
"product_id": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File-debuginfo@1.15-481.1.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.i686",
"product": {
"name": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.i686",
"product_id": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File-debuginfo@1.16-481.1.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.i686",
"product": {
"name": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.i686",
"product_id": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode-debuginfo@1.48-481.1.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.i686",
"product": {
"name": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.i686",
"product_id": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX-debuginfo@1.94-481.1.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.i686",
"product": {
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.i686",
"product_id": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname-debuginfo@1.23-481.1.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.i686",
"product": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.i686",
"product_id": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece-debuginfo@1.3401-481.1.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-debuginfo-4:5.32.1-481.1.el9_6.i686",
"product": {
"name": "perl-debuginfo-4:5.32.1-481.1.el9_6.i686",
"product_id": "perl-debuginfo-4:5.32.1-481.1.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debuginfo@5.32.1-481.1.el9_6?arch=i686\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.i686",
"product": {
"name": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.i686",
"product_id": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter-debuginfo@5.32.1-481.1.el9_6?arch=i686\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.i686",
"product": {
"name": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.i686",
"product_id": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs-debuginfo@5.32.1-481.1.el9_6?arch=i686\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-debuginfo-0:1.23-481.1.el9_6.i686",
"product": {
"name": "perl-mro-debuginfo-0:1.23-481.1.el9_6.i686",
"product_id": "perl-mro-debuginfo-0:1.23-481.1.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro-debuginfo@1.23-481.1.el9_6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-4:5.32.1-481.1.el9_6.s390x",
"product": {
"name": "perl-4:5.32.1-481.1.el9_6.s390x",
"product_id": "perl-4:5.32.1-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl@5.32.1-481.1.el9_6?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-0:1.80-481.1.el9_6.s390x",
"product": {
"name": "perl-B-0:1.80-481.1.el9_6.s390x",
"product_id": "perl-B-0:1.80-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B@1.80-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-0:1.28-481.1.el9_6.s390x",
"product": {
"name": "perl-Devel-Peek-0:1.28-481.1.el9_6.s390x",
"product_id": "perl-Devel-Peek-0:1.28-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek@1.28-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-DynaLoader-0:1.47-481.1.el9_6.s390x",
"product": {
"name": "perl-DynaLoader-0:1.47-481.1.el9_6.s390x",
"product_id": "perl-DynaLoader-0:1.47-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-DynaLoader@1.47-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Errno-0:1.30-481.1.el9_6.s390x",
"product": {
"name": "perl-Errno-0:1.30-481.1.el9_6.s390x",
"product_id": "perl-Errno-0:1.30-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Errno@1.30-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-0:1.13-481.1.el9_6.s390x",
"product": {
"name": "perl-Fcntl-0:1.13-481.1.el9_6.s390x",
"product_id": "perl-Fcntl-0:1.13-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl@1.13-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-0:1.12-481.1.el9_6.s390x",
"product": {
"name": "perl-File-DosGlob-0:1.12-481.1.el9_6.s390x",
"product_id": "perl-File-DosGlob-0:1.12-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob@1.12-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-0:1.18-481.1.el9_6.s390x",
"product": {
"name": "perl-GDBM_File-0:1.18-481.1.el9_6.s390x",
"product_id": "perl-GDBM_File-0:1.18-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File@1.18-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-0:0.23-481.1.el9_6.s390x",
"product": {
"name": "perl-Hash-Util-0:0.23-481.1.el9_6.s390x",
"product_id": "perl-Hash-Util-0:0.23-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util@0.23-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.s390x",
"product": {
"name": "perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.s390x",
"product_id": "perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash@1.20-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-0:0.19-481.1.el9_6.s390x",
"product": {
"name": "perl-I18N-Langinfo-0:0.19-481.1.el9_6.s390x",
"product_id": "perl-I18N-Langinfo-0:0.19-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo@0.19-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-IO-0:1.43-481.1.el9_6.s390x",
"product": {
"name": "perl-IO-0:1.43-481.1.el9_6.s390x",
"product_id": "perl-IO-0:1.43-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO@1.43-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-0:1.15-481.1.el9_6.s390x",
"product": {
"name": "perl-NDBM_File-0:1.15-481.1.el9_6.s390x",
"product_id": "perl-NDBM_File-0:1.15-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File@1.15-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-0:1.16-481.1.el9_6.s390x",
"product": {
"name": "perl-ODBM_File-0:1.16-481.1.el9_6.s390x",
"product_id": "perl-ODBM_File-0:1.16-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File@1.16-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-0:1.48-481.1.el9_6.s390x",
"product": {
"name": "perl-Opcode-0:1.48-481.1.el9_6.s390x",
"product_id": "perl-Opcode-0:1.48-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode@1.48-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-0:1.94-481.1.el9_6.s390x",
"product": {
"name": "perl-POSIX-0:1.94-481.1.el9_6.s390x",
"product_id": "perl-POSIX-0:1.94-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX@1.94-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-0:1.23-481.1.el9_6.s390x",
"product": {
"name": "perl-Sys-Hostname-0:1.23-481.1.el9_6.s390x",
"product_id": "perl-Sys-Hostname-0:1.23-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname@1.23-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-0:1.3401-481.1.el9_6.s390x",
"product": {
"name": "perl-Time-Piece-0:1.3401-481.1.el9_6.s390x",
"product_id": "perl-Time-Piece-0:1.3401-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece@1.3401-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-devel-4:5.32.1-481.1.el9_6.s390x",
"product": {
"name": "perl-devel-4:5.32.1-481.1.el9_6.s390x",
"product_id": "perl-devel-4:5.32.1-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-devel@5.32.1-481.1.el9_6?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-4:5.32.1-481.1.el9_6.s390x",
"product": {
"name": "perl-interpreter-4:5.32.1-481.1.el9_6.s390x",
"product_id": "perl-interpreter-4:5.32.1-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter@5.32.1-481.1.el9_6?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-lib-0:0.65-481.1.el9_6.s390x",
"product": {
"name": "perl-lib-0:0.65-481.1.el9_6.s390x",
"product_id": "perl-lib-0:0.65-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-lib@0.65-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-libs-4:5.32.1-481.1.el9_6.s390x",
"product": {
"name": "perl-libs-4:5.32.1-481.1.el9_6.s390x",
"product_id": "perl-libs-4:5.32.1-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs@5.32.1-481.1.el9_6?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-0:1.23-481.1.el9_6.s390x",
"product": {
"name": "perl-mro-0:1.23-481.1.el9_6.s390x",
"product_id": "perl-mro-0:1.23-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro@1.23-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-ph-0:5.32.1-481.1.el9_6.s390x",
"product": {
"name": "perl-ph-0:5.32.1-481.1.el9_6.s390x",
"product_id": "perl-ph-0:5.32.1-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ph@5.32.1-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-debugsource-4:5.32.1-481.1.el9_6.s390x",
"product": {
"name": "perl-debugsource-4:5.32.1-481.1.el9_6.s390x",
"product_id": "perl-debugsource-4:5.32.1-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debugsource@5.32.1-481.1.el9_6?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-debuginfo-0:1.80-481.1.el9_6.s390x",
"product": {
"name": "perl-B-debuginfo-0:1.80-481.1.el9_6.s390x",
"product_id": "perl-B-debuginfo-0:1.80-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B-debuginfo@1.80-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.s390x",
"product": {
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.s390x",
"product_id": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek-debuginfo@1.28-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.s390x",
"product": {
"name": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.s390x",
"product_id": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl-debuginfo@1.13-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.s390x",
"product": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.s390x",
"product_id": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob-debuginfo@1.12-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.s390x",
"product": {
"name": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.s390x",
"product_id": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File-debuginfo@1.18-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.s390x",
"product": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.s390x",
"product_id": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash-debuginfo@1.20-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.s390x",
"product": {
"name": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.s390x",
"product_id": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-debuginfo@0.23-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.s390x",
"product": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.s390x",
"product_id": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo-debuginfo@0.19-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-IO-debuginfo-0:1.43-481.1.el9_6.s390x",
"product": {
"name": "perl-IO-debuginfo-0:1.43-481.1.el9_6.s390x",
"product_id": "perl-IO-debuginfo-0:1.43-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO-debuginfo@1.43-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.s390x",
"product": {
"name": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.s390x",
"product_id": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File-debuginfo@1.15-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.s390x",
"product": {
"name": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.s390x",
"product_id": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File-debuginfo@1.16-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.s390x",
"product": {
"name": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.s390x",
"product_id": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode-debuginfo@1.48-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.s390x",
"product": {
"name": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.s390x",
"product_id": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX-debuginfo@1.94-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.s390x",
"product": {
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.s390x",
"product_id": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname-debuginfo@1.23-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.s390x",
"product": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.s390x",
"product_id": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece-debuginfo@1.3401-481.1.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"product": {
"name": "perl-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"product_id": "perl-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debuginfo@5.32.1-481.1.el9_6?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"product": {
"name": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"product_id": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter-debuginfo@5.32.1-481.1.el9_6?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"product": {
"name": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"product_id": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs-debuginfo@5.32.1-481.1.el9_6?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-debuginfo-0:1.23-481.1.el9_6.s390x",
"product": {
"name": "perl-mro-debuginfo-0:1.23-481.1.el9_6.s390x",
"product_id": "perl-mro-debuginfo-0:1.23-481.1.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro-debuginfo@1.23-481.1.el9_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-Attribute-Handlers-0:1.01-481.1.el9_6.noarch",
"product": {
"name": "perl-Attribute-Handlers-0:1.01-481.1.el9_6.noarch",
"product_id": "perl-Attribute-Handlers-0:1.01-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Attribute-Handlers@1.01-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-AutoLoader-0:5.74-481.1.el9_6.noarch",
"product": {
"name": "perl-AutoLoader-0:5.74-481.1.el9_6.noarch",
"product_id": "perl-AutoLoader-0:5.74-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-AutoLoader@5.74-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-AutoSplit-0:5.74-481.1.el9_6.noarch",
"product": {
"name": "perl-AutoSplit-0:5.74-481.1.el9_6.noarch",
"product_id": "perl-AutoSplit-0:5.74-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-AutoSplit@5.74-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Benchmark-0:1.23-481.1.el9_6.noarch",
"product": {
"name": "perl-Benchmark-0:1.23-481.1.el9_6.noarch",
"product_id": "perl-Benchmark-0:1.23-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Benchmark@1.23-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Class-Struct-0:0.66-481.1.el9_6.noarch",
"product": {
"name": "perl-Class-Struct-0:0.66-481.1.el9_6.noarch",
"product_id": "perl-Class-Struct-0:0.66-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Class-Struct@0.66-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Config-Extensions-0:0.03-481.1.el9_6.noarch",
"product": {
"name": "perl-Config-Extensions-0:0.03-481.1.el9_6.noarch",
"product_id": "perl-Config-Extensions-0:0.03-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Config-Extensions@0.03-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-DBM_Filter-0:0.06-481.1.el9_6.noarch",
"product": {
"name": "perl-DBM_Filter-0:0.06-481.1.el9_6.noarch",
"product_id": "perl-DBM_Filter-0:0.06-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-DBM_Filter@0.06-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-SelfStubber-0:1.06-481.1.el9_6.noarch",
"product": {
"name": "perl-Devel-SelfStubber-0:1.06-481.1.el9_6.noarch",
"product_id": "perl-Devel-SelfStubber-0:1.06-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-SelfStubber@1.06-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-DirHandle-0:1.05-481.1.el9_6.noarch",
"product": {
"name": "perl-DirHandle-0:1.05-481.1.el9_6.noarch",
"product_id": "perl-DirHandle-0:1.05-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-DirHandle@1.05-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Dumpvalue-0:2.27-481.1.el9_6.noarch",
"product": {
"name": "perl-Dumpvalue-0:2.27-481.1.el9_6.noarch",
"product_id": "perl-Dumpvalue-0:2.27-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Dumpvalue@2.27-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-English-0:1.11-481.1.el9_6.noarch",
"product": {
"name": "perl-English-0:1.11-481.1.el9_6.noarch",
"product_id": "perl-English-0:1.11-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-English@1.11-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-ExtUtils-Constant-0:0.25-481.1.el9_6.noarch",
"product": {
"name": "perl-ExtUtils-Constant-0:0.25-481.1.el9_6.noarch",
"product_id": "perl-ExtUtils-Constant-0:0.25-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ExtUtils-Constant@0.25-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-ExtUtils-Embed-0:1.35-481.1.el9_6.noarch",
"product": {
"name": "perl-ExtUtils-Embed-0:1.35-481.1.el9_6.noarch",
"product_id": "perl-ExtUtils-Embed-0:1.35-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ExtUtils-Embed@1.35-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-ExtUtils-Miniperl-0:1.09-481.1.el9_6.noarch",
"product": {
"name": "perl-ExtUtils-Miniperl-0:1.09-481.1.el9_6.noarch",
"product_id": "perl-ExtUtils-Miniperl-0:1.09-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ExtUtils-Miniperl@1.09-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-File-Basename-0:2.85-481.1.el9_6.noarch",
"product": {
"name": "perl-File-Basename-0:2.85-481.1.el9_6.noarch",
"product_id": "perl-File-Basename-0:2.85-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-Basename@2.85-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-File-Compare-0:1.100.600-481.1.el9_6.noarch",
"product": {
"name": "perl-File-Compare-0:1.100.600-481.1.el9_6.noarch",
"product_id": "perl-File-Compare-0:1.100.600-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-Compare@1.100.600-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-File-Copy-0:2.34-481.1.el9_6.noarch",
"product": {
"name": "perl-File-Copy-0:2.34-481.1.el9_6.noarch",
"product_id": "perl-File-Copy-0:2.34-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-Copy@2.34-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-File-Find-0:1.37-481.1.el9_6.noarch",
"product": {
"name": "perl-File-Find-0:1.37-481.1.el9_6.noarch",
"product_id": "perl-File-Find-0:1.37-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-Find@1.37-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-File-stat-0:1.09-481.1.el9_6.noarch",
"product": {
"name": "perl-File-stat-0:1.09-481.1.el9_6.noarch",
"product_id": "perl-File-stat-0:1.09-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-stat@1.09-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-FileCache-0:1.10-481.1.el9_6.noarch",
"product": {
"name": "perl-FileCache-0:1.10-481.1.el9_6.noarch",
"product_id": "perl-FileCache-0:1.10-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-FileCache@1.10-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-FileHandle-0:2.03-481.1.el9_6.noarch",
"product": {
"name": "perl-FileHandle-0:2.03-481.1.el9_6.noarch",
"product_id": "perl-FileHandle-0:2.03-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-FileHandle@2.03-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-FindBin-0:1.51-481.1.el9_6.noarch",
"product": {
"name": "perl-FindBin-0:1.51-481.1.el9_6.noarch",
"product_id": "perl-FindBin-0:1.51-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-FindBin@1.51-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Getopt-Std-0:1.12-481.1.el9_6.noarch",
"product": {
"name": "perl-Getopt-Std-0:1.12-481.1.el9_6.noarch",
"product_id": "perl-Getopt-Std-0:1.12-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Getopt-Std@1.12-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Collate-0:1.02-481.1.el9_6.noarch",
"product": {
"name": "perl-I18N-Collate-0:1.02-481.1.el9_6.noarch",
"product_id": "perl-I18N-Collate-0:1.02-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Collate@1.02-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-LangTags-0:0.44-481.1.el9_6.noarch",
"product": {
"name": "perl-I18N-LangTags-0:0.44-481.1.el9_6.noarch",
"product_id": "perl-I18N-LangTags-0:0.44-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-LangTags@0.44-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-IPC-Open3-0:1.21-481.1.el9_6.noarch",
"product": {
"name": "perl-IPC-Open3-0:1.21-481.1.el9_6.noarch",
"product_id": "perl-IPC-Open3-0:1.21-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IPC-Open3@1.21-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Locale-Maketext-Simple-1:0.21-481.1.el9_6.noarch",
"product": {
"name": "perl-Locale-Maketext-Simple-1:0.21-481.1.el9_6.noarch",
"product_id": "perl-Locale-Maketext-Simple-1:0.21-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Locale-Maketext-Simple@0.21-481.1.el9_6?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "perl-Math-Complex-0:1.59-481.1.el9_6.noarch",
"product": {
"name": "perl-Math-Complex-0:1.59-481.1.el9_6.noarch",
"product_id": "perl-Math-Complex-0:1.59-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Math-Complex@1.59-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Memoize-0:1.03-481.1.el9_6.noarch",
"product": {
"name": "perl-Memoize-0:1.03-481.1.el9_6.noarch",
"product_id": "perl-Memoize-0:1.03-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Memoize@1.03-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Module-Loaded-1:0.08-481.1.el9_6.noarch",
"product": {
"name": "perl-Module-Loaded-1:0.08-481.1.el9_6.noarch",
"product_id": "perl-Module-Loaded-1:0.08-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Module-Loaded@0.08-481.1.el9_6?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "perl-NEXT-0:0.67-481.1.el9_6.noarch",
"product": {
"name": "perl-NEXT-0:0.67-481.1.el9_6.noarch",
"product_id": "perl-NEXT-0:0.67-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NEXT@0.67-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Net-0:1.02-481.1.el9_6.noarch",
"product": {
"name": "perl-Net-0:1.02-481.1.el9_6.noarch",
"product_id": "perl-Net-0:1.02-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Net@1.02-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Pod-Functions-0:1.13-481.1.el9_6.noarch",
"product": {
"name": "perl-Pod-Functions-0:1.13-481.1.el9_6.noarch",
"product_id": "perl-Pod-Functions-0:1.13-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Pod-Functions@1.13-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Pod-Html-0:1.25-481.1.el9_6.noarch",
"product": {
"name": "perl-Pod-Html-0:1.25-481.1.el9_6.noarch",
"product_id": "perl-Pod-Html-0:1.25-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Pod-Html@1.25-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Safe-0:2.41-481.1.el9_6.noarch",
"product": {
"name": "perl-Safe-0:2.41-481.1.el9_6.noarch",
"product_id": "perl-Safe-0:2.41-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Safe@2.41-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Search-Dict-0:1.07-481.1.el9_6.noarch",
"product": {
"name": "perl-Search-Dict-0:1.07-481.1.el9_6.noarch",
"product_id": "perl-Search-Dict-0:1.07-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Search-Dict@1.07-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-SelectSaver-0:1.02-481.1.el9_6.noarch",
"product": {
"name": "perl-SelectSaver-0:1.02-481.1.el9_6.noarch",
"product_id": "perl-SelectSaver-0:1.02-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-SelectSaver@1.02-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-SelfLoader-0:1.26-481.1.el9_6.noarch",
"product": {
"name": "perl-SelfLoader-0:1.26-481.1.el9_6.noarch",
"product_id": "perl-SelfLoader-0:1.26-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-SelfLoader@1.26-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Symbol-0:1.08-481.1.el9_6.noarch",
"product": {
"name": "perl-Symbol-0:1.08-481.1.el9_6.noarch",
"product_id": "perl-Symbol-0:1.08-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Symbol@1.08-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Term-Complete-0:1.403-481.1.el9_6.noarch",
"product": {
"name": "perl-Term-Complete-0:1.403-481.1.el9_6.noarch",
"product_id": "perl-Term-Complete-0:1.403-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Term-Complete@1.403-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Term-ReadLine-0:1.17-481.1.el9_6.noarch",
"product": {
"name": "perl-Term-ReadLine-0:1.17-481.1.el9_6.noarch",
"product_id": "perl-Term-ReadLine-0:1.17-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Term-ReadLine@1.17-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Test-0:1.31-481.1.el9_6.noarch",
"product": {
"name": "perl-Test-0:1.31-481.1.el9_6.noarch",
"product_id": "perl-Test-0:1.31-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Test@1.31-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Text-Abbrev-0:1.02-481.1.el9_6.noarch",
"product": {
"name": "perl-Text-Abbrev-0:1.02-481.1.el9_6.noarch",
"product_id": "perl-Text-Abbrev-0:1.02-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Text-Abbrev@1.02-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Thread-0:3.05-481.1.el9_6.noarch",
"product": {
"name": "perl-Thread-0:3.05-481.1.el9_6.noarch",
"product_id": "perl-Thread-0:3.05-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Thread@3.05-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Thread-Semaphore-0:2.13-481.1.el9_6.noarch",
"product": {
"name": "perl-Thread-Semaphore-0:2.13-481.1.el9_6.noarch",
"product_id": "perl-Thread-Semaphore-0:2.13-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Thread-Semaphore@2.13-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Tie-0:4.6-481.1.el9_6.noarch",
"product": {
"name": "perl-Tie-0:4.6-481.1.el9_6.noarch",
"product_id": "perl-Tie-0:4.6-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Tie@4.6-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Tie-File-0:1.06-481.1.el9_6.noarch",
"product": {
"name": "perl-Tie-File-0:1.06-481.1.el9_6.noarch",
"product_id": "perl-Tie-File-0:1.06-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Tie-File@1.06-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Tie-Memoize-0:1.1-481.1.el9_6.noarch",
"product": {
"name": "perl-Tie-Memoize-0:1.1-481.1.el9_6.noarch",
"product_id": "perl-Tie-Memoize-0:1.1-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Tie-Memoize@1.1-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Time-0:1.03-481.1.el9_6.noarch",
"product": {
"name": "perl-Time-0:1.03-481.1.el9_6.noarch",
"product_id": "perl-Time-0:1.03-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time@1.03-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Unicode-UCD-0:0.75-481.1.el9_6.noarch",
"product": {
"name": "perl-Unicode-UCD-0:0.75-481.1.el9_6.noarch",
"product_id": "perl-Unicode-UCD-0:0.75-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Unicode-UCD@0.75-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-User-pwent-0:1.03-481.1.el9_6.noarch",
"product": {
"name": "perl-User-pwent-0:1.03-481.1.el9_6.noarch",
"product_id": "perl-User-pwent-0:1.03-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-User-pwent@1.03-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-autouse-0:1.11-481.1.el9_6.noarch",
"product": {
"name": "perl-autouse-0:1.11-481.1.el9_6.noarch",
"product_id": "perl-autouse-0:1.11-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-autouse@1.11-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-base-0:2.27-481.1.el9_6.noarch",
"product": {
"name": "perl-base-0:2.27-481.1.el9_6.noarch",
"product_id": "perl-base-0:2.27-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-base@2.27-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-blib-0:1.07-481.1.el9_6.noarch",
"product": {
"name": "perl-blib-0:1.07-481.1.el9_6.noarch",
"product_id": "perl-blib-0:1.07-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-blib@1.07-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-debugger-0:1.56-481.1.el9_6.noarch",
"product": {
"name": "perl-debugger-0:1.56-481.1.el9_6.noarch",
"product_id": "perl-debugger-0:1.56-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debugger@1.56-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-deprecate-0:0.04-481.1.el9_6.noarch",
"product": {
"name": "perl-deprecate-0:0.04-481.1.el9_6.noarch",
"product_id": "perl-deprecate-0:0.04-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-deprecate@0.04-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-diagnostics-0:1.37-481.1.el9_6.noarch",
"product": {
"name": "perl-diagnostics-0:1.37-481.1.el9_6.noarch",
"product_id": "perl-diagnostics-0:1.37-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-diagnostics@1.37-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-doc-0:5.32.1-481.1.el9_6.noarch",
"product": {
"name": "perl-doc-0:5.32.1-481.1.el9_6.noarch",
"product_id": "perl-doc-0:5.32.1-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-doc@5.32.1-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-encoding-warnings-0:0.13-481.1.el9_6.noarch",
"product": {
"name": "perl-encoding-warnings-0:0.13-481.1.el9_6.noarch",
"product_id": "perl-encoding-warnings-0:0.13-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-encoding-warnings@0.13-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-fields-0:2.27-481.1.el9_6.noarch",
"product": {
"name": "perl-fields-0:2.27-481.1.el9_6.noarch",
"product_id": "perl-fields-0:2.27-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-fields@2.27-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-filetest-0:1.03-481.1.el9_6.noarch",
"product": {
"name": "perl-filetest-0:1.03-481.1.el9_6.noarch",
"product_id": "perl-filetest-0:1.03-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-filetest@1.03-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-if-0:0.60.800-481.1.el9_6.noarch",
"product": {
"name": "perl-if-0:0.60.800-481.1.el9_6.noarch",
"product_id": "perl-if-0:0.60.800-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-if@0.60.800-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-less-0:0.03-481.1.el9_6.noarch",
"product": {
"name": "perl-less-0:0.03-481.1.el9_6.noarch",
"product_id": "perl-less-0:0.03-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-less@0.03-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-libnetcfg-4:5.32.1-481.1.el9_6.noarch",
"product": {
"name": "perl-libnetcfg-4:5.32.1-481.1.el9_6.noarch",
"product_id": "perl-libnetcfg-4:5.32.1-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libnetcfg@5.32.1-481.1.el9_6?arch=noarch\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-locale-0:1.09-481.1.el9_6.noarch",
"product": {
"name": "perl-locale-0:1.09-481.1.el9_6.noarch",
"product_id": "perl-locale-0:1.09-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-locale@1.09-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-macros-4:5.32.1-481.1.el9_6.noarch",
"product": {
"name": "perl-macros-4:5.32.1-481.1.el9_6.noarch",
"product_id": "perl-macros-4:5.32.1-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-macros@5.32.1-481.1.el9_6?arch=noarch\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-meta-notation-0:5.32.1-481.1.el9_6.noarch",
"product": {
"name": "perl-meta-notation-0:5.32.1-481.1.el9_6.noarch",
"product_id": "perl-meta-notation-0:5.32.1-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-meta-notation@5.32.1-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-open-0:1.12-481.1.el9_6.noarch",
"product": {
"name": "perl-open-0:1.12-481.1.el9_6.noarch",
"product_id": "perl-open-0:1.12-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-open@1.12-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-overload-0:1.31-481.1.el9_6.noarch",
"product": {
"name": "perl-overload-0:1.31-481.1.el9_6.noarch",
"product_id": "perl-overload-0:1.31-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-overload@1.31-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-overloading-0:0.02-481.1.el9_6.noarch",
"product": {
"name": "perl-overloading-0:0.02-481.1.el9_6.noarch",
"product_id": "perl-overloading-0:0.02-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-overloading@0.02-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-sigtrap-0:1.09-481.1.el9_6.noarch",
"product": {
"name": "perl-sigtrap-0:1.09-481.1.el9_6.noarch",
"product_id": "perl-sigtrap-0:1.09-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-sigtrap@1.09-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-sort-0:2.04-481.1.el9_6.noarch",
"product": {
"name": "perl-sort-0:2.04-481.1.el9_6.noarch",
"product_id": "perl-sort-0:2.04-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-sort@2.04-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-subs-0:1.03-481.1.el9_6.noarch",
"product": {
"name": "perl-subs-0:1.03-481.1.el9_6.noarch",
"product_id": "perl-subs-0:1.03-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-subs@1.03-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-utils-0:5.32.1-481.1.el9_6.noarch",
"product": {
"name": "perl-utils-0:5.32.1-481.1.el9_6.noarch",
"product_id": "perl-utils-0:5.32.1-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-utils@5.32.1-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-vars-0:1.05-481.1.el9_6.noarch",
"product": {
"name": "perl-vars-0:1.05-481.1.el9_6.noarch",
"product_id": "perl-vars-0:1.05-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-vars@1.05-481.1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-vmsish-0:1.04-481.1.el9_6.noarch",
"product": {
"name": "perl-vmsish-0:1.04-481.1.el9_6.noarch",
"product_id": "perl-vmsish-0:1.04-481.1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-vmsish@1.04-481.1.el9_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.32.1-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.aarch64"
},
"product_reference": "perl-4:5.32.1-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.32.1-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.ppc64le"
},
"product_reference": "perl-4:5.32.1-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.32.1-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.s390x"
},
"product_reference": "perl-4:5.32.1-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.32.1-481.1.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.src"
},
"product_reference": "perl-4:5.32.1-481.1.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.32.1-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.x86_64"
},
"product_reference": "perl-4:5.32.1-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Attribute-Handlers-0:1.01-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Attribute-Handlers-0:1.01-481.1.el9_6.noarch"
},
"product_reference": "perl-Attribute-Handlers-0:1.01-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-AutoLoader-0:5.74-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-AutoLoader-0:5.74-481.1.el9_6.noarch"
},
"product_reference": "perl-AutoLoader-0:5.74-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-AutoSplit-0:5.74-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-AutoSplit-0:5.74-481.1.el9_6.noarch"
},
"product_reference": "perl-AutoSplit-0:5.74-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-0:1.80-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-B-0:1.80-481.1.el9_6.aarch64"
},
"product_reference": "perl-B-0:1.80-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-0:1.80-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-B-0:1.80-481.1.el9_6.ppc64le"
},
"product_reference": "perl-B-0:1.80-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-0:1.80-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-B-0:1.80-481.1.el9_6.s390x"
},
"product_reference": "perl-B-0:1.80-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-0:1.80-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-B-0:1.80-481.1.el9_6.x86_64"
},
"product_reference": "perl-B-0:1.80-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-debuginfo-0:1.80-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.aarch64"
},
"product_reference": "perl-B-debuginfo-0:1.80-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-debuginfo-0:1.80-481.1.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.i686"
},
"product_reference": "perl-B-debuginfo-0:1.80-481.1.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-debuginfo-0:1.80-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.ppc64le"
},
"product_reference": "perl-B-debuginfo-0:1.80-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-debuginfo-0:1.80-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.s390x"
},
"product_reference": "perl-B-debuginfo-0:1.80-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-debuginfo-0:1.80-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.x86_64"
},
"product_reference": "perl-B-debuginfo-0:1.80-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Benchmark-0:1.23-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Benchmark-0:1.23-481.1.el9_6.noarch"
},
"product_reference": "perl-Benchmark-0:1.23-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Class-Struct-0:0.66-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Class-Struct-0:0.66-481.1.el9_6.noarch"
},
"product_reference": "perl-Class-Struct-0:0.66-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Config-Extensions-0:0.03-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Config-Extensions-0:0.03-481.1.el9_6.noarch"
},
"product_reference": "perl-Config-Extensions-0:0.03-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-DBM_Filter-0:0.06-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-DBM_Filter-0:0.06-481.1.el9_6.noarch"
},
"product_reference": "perl-DBM_Filter-0:0.06-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-0:1.28-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.28-481.1.el9_6.aarch64"
},
"product_reference": "perl-Devel-Peek-0:1.28-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-0:1.28-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.28-481.1.el9_6.ppc64le"
},
"product_reference": "perl-Devel-Peek-0:1.28-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-0:1.28-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.28-481.1.el9_6.s390x"
},
"product_reference": "perl-Devel-Peek-0:1.28-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-0:1.28-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.28-481.1.el9_6.x86_64"
},
"product_reference": "perl-Devel-Peek-0:1.28-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.aarch64"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.i686"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.ppc64le"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.s390x"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.x86_64"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-SelfStubber-0:1.06-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-SelfStubber-0:1.06-481.1.el9_6.noarch"
},
"product_reference": "perl-Devel-SelfStubber-0:1.06-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-DirHandle-0:1.05-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-DirHandle-0:1.05-481.1.el9_6.noarch"
},
"product_reference": "perl-DirHandle-0:1.05-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Dumpvalue-0:2.27-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Dumpvalue-0:2.27-481.1.el9_6.noarch"
},
"product_reference": "perl-Dumpvalue-0:2.27-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-DynaLoader-0:1.47-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-DynaLoader-0:1.47-481.1.el9_6.aarch64"
},
"product_reference": "perl-DynaLoader-0:1.47-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-DynaLoader-0:1.47-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-DynaLoader-0:1.47-481.1.el9_6.ppc64le"
},
"product_reference": "perl-DynaLoader-0:1.47-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-DynaLoader-0:1.47-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-DynaLoader-0:1.47-481.1.el9_6.s390x"
},
"product_reference": "perl-DynaLoader-0:1.47-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-DynaLoader-0:1.47-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-DynaLoader-0:1.47-481.1.el9_6.x86_64"
},
"product_reference": "perl-DynaLoader-0:1.47-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-English-0:1.11-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-English-0:1.11-481.1.el9_6.noarch"
},
"product_reference": "perl-English-0:1.11-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Errno-0:1.30-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Errno-0:1.30-481.1.el9_6.aarch64"
},
"product_reference": "perl-Errno-0:1.30-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Errno-0:1.30-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Errno-0:1.30-481.1.el9_6.ppc64le"
},
"product_reference": "perl-Errno-0:1.30-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Errno-0:1.30-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Errno-0:1.30-481.1.el9_6.s390x"
},
"product_reference": "perl-Errno-0:1.30-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Errno-0:1.30-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Errno-0:1.30-481.1.el9_6.x86_64"
},
"product_reference": "perl-Errno-0:1.30-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ExtUtils-Constant-0:0.25-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-ExtUtils-Constant-0:0.25-481.1.el9_6.noarch"
},
"product_reference": "perl-ExtUtils-Constant-0:0.25-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ExtUtils-Embed-0:1.35-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-ExtUtils-Embed-0:1.35-481.1.el9_6.noarch"
},
"product_reference": "perl-ExtUtils-Embed-0:1.35-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ExtUtils-Miniperl-0:1.09-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-ExtUtils-Miniperl-0:1.09-481.1.el9_6.noarch"
},
"product_reference": "perl-ExtUtils-Miniperl-0:1.09-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-0:1.13-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-0:1.13-481.1.el9_6.aarch64"
},
"product_reference": "perl-Fcntl-0:1.13-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-0:1.13-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-0:1.13-481.1.el9_6.ppc64le"
},
"product_reference": "perl-Fcntl-0:1.13-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-0:1.13-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-0:1.13-481.1.el9_6.s390x"
},
"product_reference": "perl-Fcntl-0:1.13-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-0:1.13-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-0:1.13-481.1.el9_6.x86_64"
},
"product_reference": "perl-Fcntl-0:1.13-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.aarch64"
},
"product_reference": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.i686"
},
"product_reference": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.ppc64le"
},
"product_reference": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.s390x"
},
"product_reference": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.x86_64"
},
"product_reference": "perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-Basename-0:2.85-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-File-Basename-0:2.85-481.1.el9_6.noarch"
},
"product_reference": "perl-File-Basename-0:2.85-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-Compare-0:1.100.600-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-File-Compare-0:1.100.600-481.1.el9_6.noarch"
},
"product_reference": "perl-File-Compare-0:1.100.600-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-Copy-0:2.34-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-File-Copy-0:2.34-481.1.el9_6.noarch"
},
"product_reference": "perl-File-Copy-0:2.34-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-0:1.12-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-0:1.12-481.1.el9_6.aarch64"
},
"product_reference": "perl-File-DosGlob-0:1.12-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-0:1.12-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-0:1.12-481.1.el9_6.ppc64le"
},
"product_reference": "perl-File-DosGlob-0:1.12-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-0:1.12-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-0:1.12-481.1.el9_6.s390x"
},
"product_reference": "perl-File-DosGlob-0:1.12-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-0:1.12-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-0:1.12-481.1.el9_6.x86_64"
},
"product_reference": "perl-File-DosGlob-0:1.12-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.aarch64"
},
"product_reference": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.i686"
},
"product_reference": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.ppc64le"
},
"product_reference": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.s390x"
},
"product_reference": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.x86_64"
},
"product_reference": "perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-Find-0:1.37-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-File-Find-0:1.37-481.1.el9_6.noarch"
},
"product_reference": "perl-File-Find-0:1.37-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-stat-0:1.09-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-File-stat-0:1.09-481.1.el9_6.noarch"
},
"product_reference": "perl-File-stat-0:1.09-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-FileCache-0:1.10-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-FileCache-0:1.10-481.1.el9_6.noarch"
},
"product_reference": "perl-FileCache-0:1.10-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-FileHandle-0:2.03-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-FileHandle-0:2.03-481.1.el9_6.noarch"
},
"product_reference": "perl-FileHandle-0:2.03-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-FindBin-0:1.51-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-FindBin-0:1.51-481.1.el9_6.noarch"
},
"product_reference": "perl-FindBin-0:1.51-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-0:1.18-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-0:1.18-481.1.el9_6.aarch64"
},
"product_reference": "perl-GDBM_File-0:1.18-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-0:1.18-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-0:1.18-481.1.el9_6.ppc64le"
},
"product_reference": "perl-GDBM_File-0:1.18-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-0:1.18-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-0:1.18-481.1.el9_6.s390x"
},
"product_reference": "perl-GDBM_File-0:1.18-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-0:1.18-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-0:1.18-481.1.el9_6.x86_64"
},
"product_reference": "perl-GDBM_File-0:1.18-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.aarch64"
},
"product_reference": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.i686"
},
"product_reference": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.ppc64le"
},
"product_reference": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.s390x"
},
"product_reference": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.x86_64"
},
"product_reference": "perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Getopt-Std-0:1.12-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Getopt-Std-0:1.12-481.1.el9_6.noarch"
},
"product_reference": "perl-Getopt-Std-0:1.12-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-0:0.23-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-0:0.23-481.1.el9_6.aarch64"
},
"product_reference": "perl-Hash-Util-0:0.23-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-0:0.23-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-0:0.23-481.1.el9_6.ppc64le"
},
"product_reference": "perl-Hash-Util-0:0.23-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-0:0.23-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-0:0.23-481.1.el9_6.s390x"
},
"product_reference": "perl-Hash-Util-0:0.23-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-0:0.23-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-0:0.23-481.1.el9_6.x86_64"
},
"product_reference": "perl-Hash-Util-0:0.23-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.aarch64"
},
"product_reference": "perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.ppc64le"
},
"product_reference": "perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.s390x"
},
"product_reference": "perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.x86_64"
},
"product_reference": "perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.aarch64"
},
"product_reference": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.i686"
},
"product_reference": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.ppc64le"
},
"product_reference": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.s390x"
},
"product_reference": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.x86_64"
},
"product_reference": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.aarch64"
},
"product_reference": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.i686"
},
"product_reference": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.ppc64le"
},
"product_reference": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.s390x"
},
"product_reference": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.x86_64"
},
"product_reference": "perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Collate-0:1.02-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Collate-0:1.02-481.1.el9_6.noarch"
},
"product_reference": "perl-I18N-Collate-0:1.02-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-LangTags-0:0.44-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-LangTags-0:0.44-481.1.el9_6.noarch"
},
"product_reference": "perl-I18N-LangTags-0:0.44-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-0:0.19-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-0:0.19-481.1.el9_6.aarch64"
},
"product_reference": "perl-I18N-Langinfo-0:0.19-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-0:0.19-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-0:0.19-481.1.el9_6.ppc64le"
},
"product_reference": "perl-I18N-Langinfo-0:0.19-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-0:0.19-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-0:0.19-481.1.el9_6.s390x"
},
"product_reference": "perl-I18N-Langinfo-0:0.19-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-0:0.19-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-0:0.19-481.1.el9_6.x86_64"
},
"product_reference": "perl-I18N-Langinfo-0:0.19-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.aarch64"
},
"product_reference": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.i686"
},
"product_reference": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.ppc64le"
},
"product_reference": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.s390x"
},
"product_reference": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.x86_64"
},
"product_reference": "perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-0:1.43-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-IO-0:1.43-481.1.el9_6.aarch64"
},
"product_reference": "perl-IO-0:1.43-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-0:1.43-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-IO-0:1.43-481.1.el9_6.ppc64le"
},
"product_reference": "perl-IO-0:1.43-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-0:1.43-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-IO-0:1.43-481.1.el9_6.s390x"
},
"product_reference": "perl-IO-0:1.43-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-0:1.43-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-IO-0:1.43-481.1.el9_6.x86_64"
},
"product_reference": "perl-IO-0:1.43-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.43-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.aarch64"
},
"product_reference": "perl-IO-debuginfo-0:1.43-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.43-481.1.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.i686"
},
"product_reference": "perl-IO-debuginfo-0:1.43-481.1.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.43-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.ppc64le"
},
"product_reference": "perl-IO-debuginfo-0:1.43-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.43-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.s390x"
},
"product_reference": "perl-IO-debuginfo-0:1.43-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.43-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.x86_64"
},
"product_reference": "perl-IO-debuginfo-0:1.43-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IPC-Open3-0:1.21-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-IPC-Open3-0:1.21-481.1.el9_6.noarch"
},
"product_reference": "perl-IPC-Open3-0:1.21-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Locale-Maketext-Simple-1:0.21-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Locale-Maketext-Simple-1:0.21-481.1.el9_6.noarch"
},
"product_reference": "perl-Locale-Maketext-Simple-1:0.21-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Math-Complex-0:1.59-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Math-Complex-0:1.59-481.1.el9_6.noarch"
},
"product_reference": "perl-Math-Complex-0:1.59-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Memoize-0:1.03-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Memoize-0:1.03-481.1.el9_6.noarch"
},
"product_reference": "perl-Memoize-0:1.03-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Module-Loaded-1:0.08-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Module-Loaded-1:0.08-481.1.el9_6.noarch"
},
"product_reference": "perl-Module-Loaded-1:0.08-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-0:1.15-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-0:1.15-481.1.el9_6.aarch64"
},
"product_reference": "perl-NDBM_File-0:1.15-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-0:1.15-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-0:1.15-481.1.el9_6.ppc64le"
},
"product_reference": "perl-NDBM_File-0:1.15-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-0:1.15-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-0:1.15-481.1.el9_6.s390x"
},
"product_reference": "perl-NDBM_File-0:1.15-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-0:1.15-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-0:1.15-481.1.el9_6.x86_64"
},
"product_reference": "perl-NDBM_File-0:1.15-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.aarch64"
},
"product_reference": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.i686"
},
"product_reference": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.ppc64le"
},
"product_reference": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.s390x"
},
"product_reference": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.x86_64"
},
"product_reference": "perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NEXT-0:0.67-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-NEXT-0:0.67-481.1.el9_6.noarch"
},
"product_reference": "perl-NEXT-0:0.67-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Net-0:1.02-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Net-0:1.02-481.1.el9_6.noarch"
},
"product_reference": "perl-Net-0:1.02-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-0:1.16-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-0:1.16-481.1.el9_6.aarch64"
},
"product_reference": "perl-ODBM_File-0:1.16-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-0:1.16-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-0:1.16-481.1.el9_6.ppc64le"
},
"product_reference": "perl-ODBM_File-0:1.16-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-0:1.16-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-0:1.16-481.1.el9_6.s390x"
},
"product_reference": "perl-ODBM_File-0:1.16-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-0:1.16-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-0:1.16-481.1.el9_6.x86_64"
},
"product_reference": "perl-ODBM_File-0:1.16-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.aarch64"
},
"product_reference": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.i686"
},
"product_reference": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.ppc64le"
},
"product_reference": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.s390x"
},
"product_reference": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.x86_64"
},
"product_reference": "perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-0:1.48-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-0:1.48-481.1.el9_6.aarch64"
},
"product_reference": "perl-Opcode-0:1.48-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-0:1.48-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-0:1.48-481.1.el9_6.ppc64le"
},
"product_reference": "perl-Opcode-0:1.48-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-0:1.48-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-0:1.48-481.1.el9_6.s390x"
},
"product_reference": "perl-Opcode-0:1.48-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-0:1.48-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-0:1.48-481.1.el9_6.x86_64"
},
"product_reference": "perl-Opcode-0:1.48-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.aarch64"
},
"product_reference": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.i686"
},
"product_reference": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.ppc64le"
},
"product_reference": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.s390x"
},
"product_reference": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.x86_64"
},
"product_reference": "perl-Opcode-debuginfo-0:1.48-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-0:1.94-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-0:1.94-481.1.el9_6.aarch64"
},
"product_reference": "perl-POSIX-0:1.94-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-0:1.94-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-0:1.94-481.1.el9_6.ppc64le"
},
"product_reference": "perl-POSIX-0:1.94-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-0:1.94-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-0:1.94-481.1.el9_6.s390x"
},
"product_reference": "perl-POSIX-0:1.94-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-0:1.94-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-0:1.94-481.1.el9_6.x86_64"
},
"product_reference": "perl-POSIX-0:1.94-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.aarch64"
},
"product_reference": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.i686"
},
"product_reference": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.ppc64le"
},
"product_reference": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.s390x"
},
"product_reference": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.x86_64"
},
"product_reference": "perl-POSIX-debuginfo-0:1.94-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Pod-Functions-0:1.13-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Pod-Functions-0:1.13-481.1.el9_6.noarch"
},
"product_reference": "perl-Pod-Functions-0:1.13-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Pod-Html-0:1.25-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Pod-Html-0:1.25-481.1.el9_6.noarch"
},
"product_reference": "perl-Pod-Html-0:1.25-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Safe-0:2.41-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Safe-0:2.41-481.1.el9_6.noarch"
},
"product_reference": "perl-Safe-0:2.41-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Search-Dict-0:1.07-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Search-Dict-0:1.07-481.1.el9_6.noarch"
},
"product_reference": "perl-Search-Dict-0:1.07-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SelectSaver-0:1.02-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-SelectSaver-0:1.02-481.1.el9_6.noarch"
},
"product_reference": "perl-SelectSaver-0:1.02-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SelfLoader-0:1.26-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-SelfLoader-0:1.26-481.1.el9_6.noarch"
},
"product_reference": "perl-SelfLoader-0:1.26-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Symbol-0:1.08-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Symbol-0:1.08-481.1.el9_6.noarch"
},
"product_reference": "perl-Symbol-0:1.08-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-0:1.23-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-0:1.23-481.1.el9_6.aarch64"
},
"product_reference": "perl-Sys-Hostname-0:1.23-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-0:1.23-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-0:1.23-481.1.el9_6.ppc64le"
},
"product_reference": "perl-Sys-Hostname-0:1.23-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-0:1.23-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-0:1.23-481.1.el9_6.s390x"
},
"product_reference": "perl-Sys-Hostname-0:1.23-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-0:1.23-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-0:1.23-481.1.el9_6.x86_64"
},
"product_reference": "perl-Sys-Hostname-0:1.23-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.aarch64"
},
"product_reference": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.i686"
},
"product_reference": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.ppc64le"
},
"product_reference": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.s390x"
},
"product_reference": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.x86_64"
},
"product_reference": "perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Term-Complete-0:1.403-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Term-Complete-0:1.403-481.1.el9_6.noarch"
},
"product_reference": "perl-Term-Complete-0:1.403-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Term-ReadLine-0:1.17-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Term-ReadLine-0:1.17-481.1.el9_6.noarch"
},
"product_reference": "perl-Term-ReadLine-0:1.17-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Test-0:1.31-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Test-0:1.31-481.1.el9_6.noarch"
},
"product_reference": "perl-Test-0:1.31-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Text-Abbrev-0:1.02-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Text-Abbrev-0:1.02-481.1.el9_6.noarch"
},
"product_reference": "perl-Text-Abbrev-0:1.02-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Thread-0:3.05-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Thread-0:3.05-481.1.el9_6.noarch"
},
"product_reference": "perl-Thread-0:3.05-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Thread-Semaphore-0:2.13-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Thread-Semaphore-0:2.13-481.1.el9_6.noarch"
},
"product_reference": "perl-Thread-Semaphore-0:2.13-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Tie-0:4.6-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Tie-0:4.6-481.1.el9_6.noarch"
},
"product_reference": "perl-Tie-0:4.6-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Tie-File-0:1.06-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Tie-File-0:1.06-481.1.el9_6.noarch"
},
"product_reference": "perl-Tie-File-0:1.06-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Tie-Memoize-0:1.1-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Tie-Memoize-0:1.1-481.1.el9_6.noarch"
},
"product_reference": "perl-Tie-Memoize-0:1.1-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-0:1.03-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Time-0:1.03-481.1.el9_6.noarch"
},
"product_reference": "perl-Time-0:1.03-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-0:1.3401-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-0:1.3401-481.1.el9_6.aarch64"
},
"product_reference": "perl-Time-Piece-0:1.3401-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-0:1.3401-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-0:1.3401-481.1.el9_6.ppc64le"
},
"product_reference": "perl-Time-Piece-0:1.3401-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-0:1.3401-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-0:1.3401-481.1.el9_6.s390x"
},
"product_reference": "perl-Time-Piece-0:1.3401-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-0:1.3401-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-0:1.3401-481.1.el9_6.x86_64"
},
"product_reference": "perl-Time-Piece-0:1.3401-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.aarch64"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.i686"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.ppc64le"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.s390x"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.x86_64"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Unicode-UCD-0:0.75-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-Unicode-UCD-0:0.75-481.1.el9_6.noarch"
},
"product_reference": "perl-Unicode-UCD-0:0.75-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-User-pwent-0:1.03-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-User-pwent-0:1.03-481.1.el9_6.noarch"
},
"product_reference": "perl-User-pwent-0:1.03-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-autouse-0:1.11-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-autouse-0:1.11-481.1.el9_6.noarch"
},
"product_reference": "perl-autouse-0:1.11-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-0:2.27-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-base-0:2.27-481.1.el9_6.noarch"
},
"product_reference": "perl-base-0:2.27-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-blib-0:1.07-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-blib-0:1.07-481.1.el9_6.noarch"
},
"product_reference": "perl-blib-0:1.07-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugger-0:1.56-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-debugger-0:1.56-481.1.el9_6.noarch"
},
"product_reference": "perl-debugger-0:1.56-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.32.1-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.aarch64"
},
"product_reference": "perl-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.32.1-481.1.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.i686"
},
"product_reference": "perl-debuginfo-4:5.32.1-481.1.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.32.1-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.ppc64le"
},
"product_reference": "perl-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.32.1-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.s390x"
},
"product_reference": "perl-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.32.1-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.x86_64"
},
"product_reference": "perl-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.32.1-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.aarch64"
},
"product_reference": "perl-debugsource-4:5.32.1-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.32.1-481.1.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.i686"
},
"product_reference": "perl-debugsource-4:5.32.1-481.1.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.32.1-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.ppc64le"
},
"product_reference": "perl-debugsource-4:5.32.1-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.32.1-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.s390x"
},
"product_reference": "perl-debugsource-4:5.32.1-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.32.1-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.x86_64"
},
"product_reference": "perl-debugsource-4:5.32.1-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-deprecate-0:0.04-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-deprecate-0:0.04-481.1.el9_6.noarch"
},
"product_reference": "perl-deprecate-0:0.04-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.32.1-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.aarch64"
},
"product_reference": "perl-devel-4:5.32.1-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.32.1-481.1.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.i686"
},
"product_reference": "perl-devel-4:5.32.1-481.1.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.32.1-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.ppc64le"
},
"product_reference": "perl-devel-4:5.32.1-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.32.1-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.s390x"
},
"product_reference": "perl-devel-4:5.32.1-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.32.1-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.x86_64"
},
"product_reference": "perl-devel-4:5.32.1-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-diagnostics-0:1.37-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-diagnostics-0:1.37-481.1.el9_6.noarch"
},
"product_reference": "perl-diagnostics-0:1.37-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-doc-0:5.32.1-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-doc-0:5.32.1-481.1.el9_6.noarch"
},
"product_reference": "perl-doc-0:5.32.1-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-encoding-warnings-0:0.13-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-encoding-warnings-0:0.13-481.1.el9_6.noarch"
},
"product_reference": "perl-encoding-warnings-0:0.13-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-fields-0:2.27-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-fields-0:2.27-481.1.el9_6.noarch"
},
"product_reference": "perl-fields-0:2.27-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-filetest-0:1.03-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-filetest-0:1.03-481.1.el9_6.noarch"
},
"product_reference": "perl-filetest-0:1.03-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-if-0:0.60.800-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-if-0:0.60.800-481.1.el9_6.noarch"
},
"product_reference": "perl-if-0:0.60.800-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-4:5.32.1-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-4:5.32.1-481.1.el9_6.aarch64"
},
"product_reference": "perl-interpreter-4:5.32.1-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-4:5.32.1-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-4:5.32.1-481.1.el9_6.ppc64le"
},
"product_reference": "perl-interpreter-4:5.32.1-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-4:5.32.1-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-4:5.32.1-481.1.el9_6.s390x"
},
"product_reference": "perl-interpreter-4:5.32.1-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-4:5.32.1-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-4:5.32.1-481.1.el9_6.x86_64"
},
"product_reference": "perl-interpreter-4:5.32.1-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.aarch64"
},
"product_reference": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.i686"
},
"product_reference": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.ppc64le"
},
"product_reference": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.s390x"
},
"product_reference": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.x86_64"
},
"product_reference": "perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-less-0:0.03-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-less-0:0.03-481.1.el9_6.noarch"
},
"product_reference": "perl-less-0:0.03-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-lib-0:0.65-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-lib-0:0.65-481.1.el9_6.aarch64"
},
"product_reference": "perl-lib-0:0.65-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-lib-0:0.65-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-lib-0:0.65-481.1.el9_6.ppc64le"
},
"product_reference": "perl-lib-0:0.65-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-lib-0:0.65-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-lib-0:0.65-481.1.el9_6.s390x"
},
"product_reference": "perl-lib-0:0.65-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-lib-0:0.65-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-lib-0:0.65-481.1.el9_6.x86_64"
},
"product_reference": "perl-lib-0:0.65-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libnetcfg-4:5.32.1-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-libnetcfg-4:5.32.1-481.1.el9_6.noarch"
},
"product_reference": "perl-libnetcfg-4:5.32.1-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.32.1-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.aarch64"
},
"product_reference": "perl-libs-4:5.32.1-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.32.1-481.1.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.i686"
},
"product_reference": "perl-libs-4:5.32.1-481.1.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.32.1-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.ppc64le"
},
"product_reference": "perl-libs-4:5.32.1-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.32.1-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.s390x"
},
"product_reference": "perl-libs-4:5.32.1-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.32.1-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.x86_64"
},
"product_reference": "perl-libs-4:5.32.1-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.aarch64"
},
"product_reference": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.i686"
},
"product_reference": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.ppc64le"
},
"product_reference": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.s390x"
},
"product_reference": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.x86_64"
},
"product_reference": "perl-libs-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-locale-0:1.09-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-locale-0:1.09-481.1.el9_6.noarch"
},
"product_reference": "perl-locale-0:1.09-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-macros-4:5.32.1-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-macros-4:5.32.1-481.1.el9_6.noarch"
},
"product_reference": "perl-macros-4:5.32.1-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-meta-notation-0:5.32.1-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-meta-notation-0:5.32.1-481.1.el9_6.noarch"
},
"product_reference": "perl-meta-notation-0:5.32.1-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-0:1.23-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-mro-0:1.23-481.1.el9_6.aarch64"
},
"product_reference": "perl-mro-0:1.23-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-0:1.23-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-mro-0:1.23-481.1.el9_6.ppc64le"
},
"product_reference": "perl-mro-0:1.23-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-0:1.23-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-mro-0:1.23-481.1.el9_6.s390x"
},
"product_reference": "perl-mro-0:1.23-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-0:1.23-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-mro-0:1.23-481.1.el9_6.x86_64"
},
"product_reference": "perl-mro-0:1.23-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-debuginfo-0:1.23-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.aarch64"
},
"product_reference": "perl-mro-debuginfo-0:1.23-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-debuginfo-0:1.23-481.1.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.i686"
},
"product_reference": "perl-mro-debuginfo-0:1.23-481.1.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-debuginfo-0:1.23-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.ppc64le"
},
"product_reference": "perl-mro-debuginfo-0:1.23-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-debuginfo-0:1.23-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.s390x"
},
"product_reference": "perl-mro-debuginfo-0:1.23-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-debuginfo-0:1.23-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.x86_64"
},
"product_reference": "perl-mro-debuginfo-0:1.23-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-open-0:1.12-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-open-0:1.12-481.1.el9_6.noarch"
},
"product_reference": "perl-open-0:1.12-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-overload-0:1.31-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-overload-0:1.31-481.1.el9_6.noarch"
},
"product_reference": "perl-overload-0:1.31-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-overloading-0:0.02-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-overloading-0:0.02-481.1.el9_6.noarch"
},
"product_reference": "perl-overloading-0:0.02-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ph-0:5.32.1-481.1.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-ph-0:5.32.1-481.1.el9_6.aarch64"
},
"product_reference": "perl-ph-0:5.32.1-481.1.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ph-0:5.32.1-481.1.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-ph-0:5.32.1-481.1.el9_6.ppc64le"
},
"product_reference": "perl-ph-0:5.32.1-481.1.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ph-0:5.32.1-481.1.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-ph-0:5.32.1-481.1.el9_6.s390x"
},
"product_reference": "perl-ph-0:5.32.1-481.1.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ph-0:5.32.1-481.1.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-ph-0:5.32.1-481.1.el9_6.x86_64"
},
"product_reference": "perl-ph-0:5.32.1-481.1.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-sigtrap-0:1.09-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-sigtrap-0:1.09-481.1.el9_6.noarch"
},
"product_reference": "perl-sigtrap-0:1.09-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-sort-0:2.04-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-sort-0:2.04-481.1.el9_6.noarch"
},
"product_reference": "perl-sort-0:2.04-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-subs-0:1.03-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-subs-0:1.03-481.1.el9_6.noarch"
},
"product_reference": "perl-subs-0:1.03-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-utils-0:5.32.1-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-utils-0:5.32.1-481.1.el9_6.noarch"
},
"product_reference": "perl-utils-0:5.32.1-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-vars-0:1.05-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-vars-0:1.05-481.1.el9_6.noarch"
},
"product_reference": "perl-vars-0:1.05-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-vmsish-0:1.04-481.1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:perl-vmsish-0:1.04-481.1.el9_6.noarch"
},
"product_reference": "perl-vmsish-0:1.04-481.1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-40909",
"cwe": {
"id": "CWE-426",
"name": "Untrusted Search Path"
},
"discovery_date": "2025-05-30T13:00:49.546076+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2369407"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "perl: Perl threads have a working directory race condition where file operations may target unintended paths",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to the successful exploitation of a CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027) or CWE-426: Untrusted Search Path vulnerability, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces least functionality by enabling only essential features, services, and ports to reduce the system\u2019s attack surface. Static code analysis, peer reviews, and robust input validation and error handling detect unsafe input that could affect execution timing or path resolution. Real-time threat detection, including IPS/IDS, antimalware, and continuous system monitoring, enables rapid identification of exploitation attempts. Process isolation reduces the likelihood of concurrent execution conflicts and contains any impact to isolated workloads. Executable search paths are restricted to trusted, explicitly defined directories, mitigating the risk of executing malicious files. These controls effectively lower the likelihood and impact of race conditions and untrusted path exploitation in the environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Attribute-Handlers-0:1.01-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-AutoLoader-0:5.74-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-AutoSplit-0:5.74-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-0:1.80-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-0:1.80-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-0:1.80-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-0:1.80-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Benchmark-0:1.23-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Class-Struct-0:0.66-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Config-Extensions-0:0.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DBM_Filter-0:0.06-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.28-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.28-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.28-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.28-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-SelfStubber-0:1.06-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DirHandle-0:1.05-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Dumpvalue-0:2.27-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DynaLoader-0:1.47-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DynaLoader-0:1.47-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DynaLoader-0:1.47-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DynaLoader-0:1.47-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-English-0:1.11-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Errno-0:1.30-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Errno-0:1.30-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Errno-0:1.30-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Errno-0:1.30-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ExtUtils-Constant-0:0.25-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ExtUtils-Embed-0:1.35-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ExtUtils-Miniperl-0:1.09-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-0:1.13-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-0:1.13-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-0:1.13-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-0:1.13-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-Basename-0:2.85-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-Compare-0:1.100.600-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-Copy-0:2.34-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-0:1.12-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-0:1.12-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-0:1.12-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-0:1.12-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-Find-0:1.37-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-stat-0:1.09-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-FileCache-0:1.10-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-FileHandle-0:2.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-FindBin-0:1.51-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-0:1.18-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-0:1.18-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-0:1.18-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-0:1.18-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Getopt-Std-0:1.12-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-0:0.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-0:0.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-0:0.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-0:0.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Collate-0:1.02-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-LangTags-0:0.44-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-0:0.19-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-0:0.19-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-0:0.19-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-0:0.19-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-0:1.43-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-0:1.43-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-0:1.43-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-0:1.43-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IPC-Open3-0:1.21-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Locale-Maketext-Simple-1:0.21-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Math-Complex-0:1.59-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Memoize-0:1.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Module-Loaded-1:0.08-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-0:1.15-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-0:1.15-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-0:1.15-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-0:1.15-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NEXT-0:0.67-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Net-0:1.02-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-0:1.16-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-0:1.16-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-0:1.16-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-0:1.16-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-0:1.48-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-0:1.48-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-0:1.48-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-0:1.48-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-0:1.94-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-0:1.94-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-0:1.94-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-0:1.94-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Pod-Functions-0:1.13-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Pod-Html-0:1.25-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Safe-0:2.41-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Search-Dict-0:1.07-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-SelectSaver-0:1.02-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-SelfLoader-0:1.26-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Symbol-0:1.08-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-0:1.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-0:1.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-0:1.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-0:1.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Term-Complete-0:1.403-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Term-ReadLine-0:1.17-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Test-0:1.31-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Text-Abbrev-0:1.02-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Thread-0:3.05-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Thread-Semaphore-0:2.13-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Tie-0:4.6-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Tie-File-0:1.06-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Tie-Memoize-0:1.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-0:1.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-0:1.3401-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-0:1.3401-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-0:1.3401-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-0:1.3401-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Unicode-UCD-0:0.75-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-User-pwent-0:1.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-autouse-0:1.11-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-base-0:2.27-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-blib-0:1.07-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugger-0:1.56-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-deprecate-0:0.04-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-diagnostics-0:1.37-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-doc-0:5.32.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-encoding-warnings-0:0.13-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-fields-0:2.27-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-filetest-0:1.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-if-0:0.60.800-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-less-0:0.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-lib-0:0.65-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-lib-0:0.65-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-lib-0:0.65-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-lib-0:0.65-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libnetcfg-4:5.32.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-locale-0:1.09-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-macros-4:5.32.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-meta-notation-0:5.32.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-0:1.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-0:1.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-0:1.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-0:1.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-open-0:1.12-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-overload-0:1.31-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-overloading-0:0.02-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ph-0:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ph-0:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ph-0:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ph-0:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-sigtrap-0:1.09-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-sort-0:2.04-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-subs-0:1.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-utils-0:5.32.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-vars-0:1.05-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-vmsish-0:1.04-481.1.el9_6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-40909"
},
{
"category": "external",
"summary": "RHBZ#2369407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369407"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-40909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40909"
},
{
"category": "external",
"summary": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226"
},
{
"category": "external",
"summary": "https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e",
"url": "https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e"
},
{
"category": "external",
"summary": "https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch",
"url": "https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch"
},
{
"category": "external",
"summary": "https://github.com/Perl/perl5/issues/10387",
"url": "https://github.com/Perl/perl5/issues/10387"
},
{
"category": "external",
"summary": "https://github.com/Perl/perl5/issues/23010",
"url": "https://github.com/Perl/perl5/issues/23010"
},
{
"category": "external",
"summary": "https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads",
"url": "https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/05/22/2",
"url": "https://www.openwall.com/lists/oss-security/2025/05/22/2"
}
],
"release_date": "2025-05-30T12:20:11.237000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-28T02:32:35+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Attribute-Handlers-0:1.01-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-AutoLoader-0:5.74-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-AutoSplit-0:5.74-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-0:1.80-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-0:1.80-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-0:1.80-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-0:1.80-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Benchmark-0:1.23-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Class-Struct-0:0.66-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Config-Extensions-0:0.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DBM_Filter-0:0.06-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.28-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.28-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.28-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.28-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-SelfStubber-0:1.06-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DirHandle-0:1.05-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Dumpvalue-0:2.27-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DynaLoader-0:1.47-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DynaLoader-0:1.47-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DynaLoader-0:1.47-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DynaLoader-0:1.47-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-English-0:1.11-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Errno-0:1.30-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Errno-0:1.30-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Errno-0:1.30-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Errno-0:1.30-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ExtUtils-Constant-0:0.25-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ExtUtils-Embed-0:1.35-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ExtUtils-Miniperl-0:1.09-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-0:1.13-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-0:1.13-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-0:1.13-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-0:1.13-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-Basename-0:2.85-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-Compare-0:1.100.600-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-Copy-0:2.34-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-0:1.12-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-0:1.12-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-0:1.12-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-0:1.12-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-Find-0:1.37-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-stat-0:1.09-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-FileCache-0:1.10-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-FileHandle-0:2.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-FindBin-0:1.51-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-0:1.18-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-0:1.18-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-0:1.18-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-0:1.18-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Getopt-Std-0:1.12-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-0:0.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-0:0.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-0:0.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-0:0.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Collate-0:1.02-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-LangTags-0:0.44-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-0:0.19-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-0:0.19-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-0:0.19-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-0:0.19-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-0:1.43-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-0:1.43-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-0:1.43-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-0:1.43-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IPC-Open3-0:1.21-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Locale-Maketext-Simple-1:0.21-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Math-Complex-0:1.59-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Memoize-0:1.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Module-Loaded-1:0.08-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-0:1.15-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-0:1.15-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-0:1.15-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-0:1.15-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NEXT-0:0.67-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Net-0:1.02-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-0:1.16-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-0:1.16-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-0:1.16-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-0:1.16-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-0:1.48-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-0:1.48-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-0:1.48-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-0:1.48-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-0:1.94-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-0:1.94-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-0:1.94-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-0:1.94-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Pod-Functions-0:1.13-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Pod-Html-0:1.25-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Safe-0:2.41-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Search-Dict-0:1.07-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-SelectSaver-0:1.02-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-SelfLoader-0:1.26-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Symbol-0:1.08-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-0:1.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-0:1.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-0:1.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-0:1.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Term-Complete-0:1.403-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Term-ReadLine-0:1.17-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Test-0:1.31-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Text-Abbrev-0:1.02-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Thread-0:3.05-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Thread-Semaphore-0:2.13-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Tie-0:4.6-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Tie-File-0:1.06-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Tie-Memoize-0:1.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-0:1.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-0:1.3401-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-0:1.3401-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-0:1.3401-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-0:1.3401-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Unicode-UCD-0:0.75-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-User-pwent-0:1.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-autouse-0:1.11-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-base-0:2.27-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-blib-0:1.07-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugger-0:1.56-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-deprecate-0:0.04-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-diagnostics-0:1.37-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-doc-0:5.32.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-encoding-warnings-0:0.13-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-fields-0:2.27-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-filetest-0:1.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-if-0:0.60.800-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-less-0:0.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-lib-0:0.65-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-lib-0:0.65-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-lib-0:0.65-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-lib-0:0.65-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libnetcfg-4:5.32.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-locale-0:1.09-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-macros-4:5.32.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-meta-notation-0:5.32.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-0:1.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-0:1.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-0:1.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-0:1.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-open-0:1.12-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-overload-0:1.31-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-overloading-0:0.02-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ph-0:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ph-0:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ph-0:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ph-0:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-sigtrap-0:1.09-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-sort-0:2.04-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-subs-0:1.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-utils-0:5.32.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-vars-0:1.05-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-vmsish-0:1.04-481.1.el9_6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:11804"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Attribute-Handlers-0:1.01-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-AutoLoader-0:5.74-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-AutoSplit-0:5.74-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-0:1.80-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-0:1.80-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-0:1.80-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-0:1.80-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Benchmark-0:1.23-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Class-Struct-0:0.66-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Config-Extensions-0:0.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DBM_Filter-0:0.06-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.28-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.28-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.28-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.28-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-SelfStubber-0:1.06-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DirHandle-0:1.05-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Dumpvalue-0:2.27-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DynaLoader-0:1.47-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DynaLoader-0:1.47-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DynaLoader-0:1.47-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DynaLoader-0:1.47-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-English-0:1.11-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Errno-0:1.30-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Errno-0:1.30-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Errno-0:1.30-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Errno-0:1.30-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ExtUtils-Constant-0:0.25-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ExtUtils-Embed-0:1.35-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ExtUtils-Miniperl-0:1.09-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-0:1.13-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-0:1.13-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-0:1.13-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-0:1.13-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-Basename-0:2.85-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-Compare-0:1.100.600-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-Copy-0:2.34-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-0:1.12-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-0:1.12-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-0:1.12-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-0:1.12-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-Find-0:1.37-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-stat-0:1.09-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-FileCache-0:1.10-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-FileHandle-0:2.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-FindBin-0:1.51-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-0:1.18-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-0:1.18-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-0:1.18-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-0:1.18-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Getopt-Std-0:1.12-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-0:0.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-0:0.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-0:0.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-0:0.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Collate-0:1.02-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-LangTags-0:0.44-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-0:0.19-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-0:0.19-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-0:0.19-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-0:0.19-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-0:1.43-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-0:1.43-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-0:1.43-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-0:1.43-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IPC-Open3-0:1.21-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Locale-Maketext-Simple-1:0.21-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Math-Complex-0:1.59-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Memoize-0:1.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Module-Loaded-1:0.08-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-0:1.15-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-0:1.15-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-0:1.15-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-0:1.15-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NEXT-0:0.67-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Net-0:1.02-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-0:1.16-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-0:1.16-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-0:1.16-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-0:1.16-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-0:1.48-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-0:1.48-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-0:1.48-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-0:1.48-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-0:1.94-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-0:1.94-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-0:1.94-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-0:1.94-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Pod-Functions-0:1.13-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Pod-Html-0:1.25-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Safe-0:2.41-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Search-Dict-0:1.07-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-SelectSaver-0:1.02-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-SelfLoader-0:1.26-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Symbol-0:1.08-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-0:1.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-0:1.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-0:1.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-0:1.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Term-Complete-0:1.403-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Term-ReadLine-0:1.17-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Test-0:1.31-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Text-Abbrev-0:1.02-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Thread-0:3.05-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Thread-Semaphore-0:2.13-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Tie-0:4.6-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Tie-File-0:1.06-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Tie-Memoize-0:1.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-0:1.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-0:1.3401-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-0:1.3401-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-0:1.3401-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-0:1.3401-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Unicode-UCD-0:0.75-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-User-pwent-0:1.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-autouse-0:1.11-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-base-0:2.27-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-blib-0:1.07-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugger-0:1.56-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-deprecate-0:0.04-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-diagnostics-0:1.37-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-doc-0:5.32.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-encoding-warnings-0:0.13-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-fields-0:2.27-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-filetest-0:1.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-if-0:0.60.800-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-less-0:0.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-lib-0:0.65-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-lib-0:0.65-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-lib-0:0.65-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-lib-0:0.65-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libnetcfg-4:5.32.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-locale-0:1.09-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-macros-4:5.32.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-meta-notation-0:5.32.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-0:1.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-0:1.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-0:1.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-0:1.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-open-0:1.12-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-overload-0:1.31-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-overloading-0:0.02-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ph-0:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ph-0:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ph-0:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ph-0:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-sigtrap-0:1.09-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-sort-0:2.04-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-subs-0:1.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-utils-0:5.32.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-vars-0:1.05-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-vmsish-0:1.04-481.1.el9_6.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:perl-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Attribute-Handlers-0:1.01-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-AutoLoader-0:5.74-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-AutoSplit-0:5.74-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-0:1.80-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-0:1.80-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-0:1.80-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-0:1.80-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-B-debuginfo-0:1.80-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Benchmark-0:1.23-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Class-Struct-0:0.66-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Config-Extensions-0:0.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DBM_Filter-0:0.06-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.28-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.28-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.28-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.28-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Devel-SelfStubber-0:1.06-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DirHandle-0:1.05-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Dumpvalue-0:2.27-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DynaLoader-0:1.47-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DynaLoader-0:1.47-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DynaLoader-0:1.47-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-DynaLoader-0:1.47-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-English-0:1.11-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Errno-0:1.30-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Errno-0:1.30-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Errno-0:1.30-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Errno-0:1.30-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ExtUtils-Constant-0:0.25-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ExtUtils-Embed-0:1.35-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ExtUtils-Miniperl-0:1.09-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-0:1.13-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-0:1.13-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-0:1.13-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-0:1.13-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Fcntl-debuginfo-0:1.13-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-Basename-0:2.85-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-Compare-0:1.100.600-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-Copy-0:2.34-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-0:1.12-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-0:1.12-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-0:1.12-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-0:1.12-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-Find-0:1.37-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-File-stat-0:1.09-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-FileCache-0:1.10-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-FileHandle-0:2.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-FindBin-0:1.51-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-0:1.18-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-0:1.18-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-0:1.18-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-0:1.18-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-GDBM_File-debuginfo-0:1.18-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Getopt-Std-0:1.12-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-0:0.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-0:0.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-0:0.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-0:0.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-0:1.20-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Hash-Util-debuginfo-0:0.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Collate-0:1.02-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-LangTags-0:0.44-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-0:0.19-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-0:0.19-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-0:0.19-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-0:0.19-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-0:1.43-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-0:1.43-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-0:1.43-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-0:1.43-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.43-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-IPC-Open3-0:1.21-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Locale-Maketext-Simple-1:0.21-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Math-Complex-0:1.59-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Memoize-0:1.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Module-Loaded-1:0.08-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-0:1.15-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-0:1.15-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-0:1.15-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-0:1.15-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NDBM_File-debuginfo-0:1.15-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-NEXT-0:0.67-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Net-0:1.02-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-0:1.16-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-0:1.16-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-0:1.16-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-0:1.16-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ODBM_File-debuginfo-0:1.16-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-0:1.48-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-0:1.48-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-0:1.48-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-0:1.48-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Opcode-debuginfo-0:1.48-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-0:1.94-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-0:1.94-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-0:1.94-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-0:1.94-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-POSIX-debuginfo-0:1.94-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Pod-Functions-0:1.13-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Pod-Html-0:1.25-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Safe-0:2.41-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Search-Dict-0:1.07-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-SelectSaver-0:1.02-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-SelfLoader-0:1.26-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Symbol-0:1.08-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-0:1.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-0:1.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-0:1.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-0:1.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Term-Complete-0:1.403-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Term-ReadLine-0:1.17-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Test-0:1.31-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Text-Abbrev-0:1.02-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Thread-0:3.05-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Thread-Semaphore-0:2.13-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Tie-0:4.6-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Tie-File-0:1.06-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Tie-Memoize-0:1.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-0:1.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-0:1.3401-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-0:1.3401-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-0:1.3401-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-0:1.3401-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-Unicode-UCD-0:0.75-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-User-pwent-0:1.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-autouse-0:1.11-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-base-0:2.27-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-blib-0:1.07-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugger-0:1.56-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-debugsource-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-deprecate-0:0.04-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-devel-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-diagnostics-0:1.37-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-doc-0:5.32.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-encoding-warnings-0:0.13-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-fields-0:2.27-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-filetest-0:1.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-if-0:0.60.800-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-less-0:0.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-lib-0:0.65-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-lib-0:0.65-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-lib-0:0.65-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-lib-0:0.65-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libnetcfg-4:5.32.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-locale-0:1.09-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-macros-4:5.32.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-meta-notation-0:5.32.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-0:1.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-0:1.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-0:1.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-0:1.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-mro-debuginfo-0:1.23-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-open-0:1.12-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-overload-0:1.31-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-overloading-0:0.02-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ph-0:5.32.1-481.1.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ph-0:5.32.1-481.1.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ph-0:5.32.1-481.1.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:perl-ph-0:5.32.1-481.1.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:perl-sigtrap-0:1.09-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-sort-0:2.04-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-subs-0:1.03-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-utils-0:5.32.1-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-vars-0:1.05-481.1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:perl-vmsish-0:1.04-481.1.el9_6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "perl: Perl threads have a working directory race condition where file operations may target unintended paths"
}
]
}
rhsa-2025:13267
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A Subscription Management tool for finding and reporting Red Hat product usage",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Discovery, also known as Discovery, is an inspection and reporting tool that finds, identifies, and reports environment data, or facts, such as the number of physical and virtual systems on a network, their operating systems, and relevant configuration data stored within them. Discovery also identifies and reports more detailed facts for some versions of key Red Hat packages and products that it finds in the network.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:13267",
"url": "https://access.redhat.com/errata/RHSA-2025:13267"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-12718",
"url": "https://access.redhat.com/security/cve/CVE-2024-12718"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-40909",
"url": "https://access.redhat.com/security/cve/CVE-2025-40909"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-4138",
"url": "https://access.redhat.com/security/cve/CVE-2025-4138"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-4330",
"url": "https://access.redhat.com/security/cve/CVE-2025-4330"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-4435",
"url": "https://access.redhat.com/security/cve/CVE-2025-4435"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-4517",
"url": "https://access.redhat.com/security/cve/CVE-2025-4517"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-49796",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6021",
"url": "https://access.redhat.com/security/cve/CVE-2025-6021"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6965",
"url": "https://access.redhat.com/security/cve/CVE-2025-6965"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-7425",
"url": "https://access.redhat.com/security/cve/CVE-2025-7425"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/subscription_central/1-latest/#Discovery",
"url": "https://docs.redhat.com/en/documentation/subscription_central/1-latest/#Discovery"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_13267.json"
}
],
"title": "Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage",
"tracking": {
"current_release_date": "2025-11-07T18:40:18+00:00",
"generator": {
"date": "2025-11-07T18:40:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2025:13267",
"initial_release_date": "2025-08-06T15:26:03+00:00",
"revision_history": [
{
"date": "2025-08-06T15:26:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-06T15:26:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-07T18:40:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Discovery 2",
"product": {
"name": "Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:discovery:2::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Discovery"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"product": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"product_id": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-server-rhel9@sha256%3Aad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344?arch=amd64\u0026repository_url=registry.redhat.io/discovery\u0026tag=2.0.1-1754478727"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"product": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"product_id": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-ui-rhel9@sha256%3A18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413?arch=amd64\u0026repository_url=registry.redhat.io/discovery\u0026tag=2.0.1-1754485705"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"product": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"product_id": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-server-rhel9@sha256%3Ac517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec?arch=arm64\u0026repository_url=registry.redhat.io/discovery\u0026tag=2.0.1-1754478727"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64",
"product": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64",
"product_id": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-ui-rhel9@sha256%3A2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc?arch=arm64\u0026repository_url=registry.redhat.io/discovery\u0026tag=2.0.1-1754485705"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64"
},
"product_reference": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"relates_to_product_reference": "Red Hat Discovery 2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64"
},
"product_reference": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"relates_to_product_reference": "Red Hat Discovery 2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64"
},
"product_reference": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"relates_to_product_reference": "Red Hat Discovery 2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
},
"product_reference": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64",
"relates_to_product_reference": "Red Hat Discovery 2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-12718",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-06-03T14:00:57.613538+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2370013"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in CPython\u0027s tarfile module. This vulnerability allows modification of file metadata, such as timestamps or permissions, outside the intended extraction directory via maliciously crafted tar archives using the filter=\"data\" or filter=\"tar\" extraction filters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: python: Bypass extraction filter to modify file metadata outside extraction directory",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The severity of this vulnerability was lowered due to the fact that successful exploitation requires the attacker to convince a privileged user or process to extract a malicious tar file. Since tar file extraction typically occurs in trusted contexts or with elevated privileges, the impact is reduced by the requirement of such access.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-12718"
},
{
"category": "external",
"summary": "RHBZ#2370013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370013"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-12718",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12718"
},
{
"category": "external",
"summary": "https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f",
"url": "https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a",
"url": "https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a",
"url": "https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/127987",
"url": "https://github.com/python/cpython/issues/127987"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/135034",
"url": "https://github.com/python/cpython/issues/135034"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/135037",
"url": "https://github.com/python/cpython/pull/135037"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/"
}
],
"release_date": "2025-06-03T12:59:10.908000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-06T15:26:03+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer RPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:13267"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cpython: python: Bypass extraction filter to modify file metadata outside extraction directory"
},
{
"cve": "CVE-2025-4138",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-06-12T09:03:58.434950+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372426"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Python tarfile module. This vulnerability allows attackers to bypass extraction filters, enabling symlink targets to escape the destination directory and allowing unauthorized modification of file metadata via the use of TarFile.extract() or TarFile.extractall() with the filter= parameter set to \"data\" or \"tar\".",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Versions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-4138"
},
{
"category": "external",
"summary": "RHBZ#2372426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4138",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4138"
},
{
"category": "external",
"summary": "https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f",
"url": "https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a",
"url": "https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a",
"url": "https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/135034",
"url": "https://github.com/python/cpython/issues/135034"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/135037",
"url": "https://github.com/python/cpython/pull/135037"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/"
}
],
"release_date": "2025-06-03T12:59:02.717000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-06T15:26:03+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer RPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:13267"
},
{
"category": "workaround",
"details": "Red Hat recommends upgrading to a fixed release of Python as soon as one is available. This vulnerability can be mitigated by rejecting links inside tarfiles that use relative references to the parent directory. The upstream advisory provides this example code:\n\n\u0027\u0027\u0027\n# Avoid insecure segments in link names.\nfor member in tar.getmembers():\n if not member.islnk():\n continue\n if os.pardir in os.path.split(member.linkname):\n raise OSError(\"Tarfile with insecure segment (\u0027..\u0027) in linkname\")\n\n# Now safe to extract members with the data filter.\ntar.extractall(filter=\"data\")\n\u0027\u0027\u0027",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory"
},
{
"cve": "CVE-2025-4330",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-06-03T14:01:00.653313+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2370014"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in CPython\u0027s tarfile module. This vulnerability allows bypassing of extraction filters, enabling symlink traversal outside the intended extraction directory and potential modification of file metadata via malicious tar archives using TarFile.extractall() or TarFile.extract() with the filter=\"data\" or filter=\"tar\" parameters. This issue leads to potentially overwriting or modifying system files and metadata.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: python: Extraction filter bypass for linking outside extraction directory",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The severity of this vulnerability was lowered due to the fact that successful exploitation requires the attacker to convince a privileged user or process to extract a malicious tar file. Since tar file extraction typically occurs in trusted contexts or with elevated privileges, the impact is reduced by the requirement of this access.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to the successful exploitation of a CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nInput validation enforces strict path constraints, rejecting directory traversal attempts or unauthorized file access. Runtime environments restrict code execution to predefined privilege levels, preventing escalation from traversal exploits. Configuration settings limit accessible directories and enforce execution boundaries to reduce the influence of user input on file system behavior. Application components are developed and validated against secure coding standards that explicitly prevent path manipulation, further minimizing exploitation risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-4330"
},
{
"category": "external",
"summary": "RHBZ#2370014",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370014"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4330",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4330"
},
{
"category": "external",
"summary": "https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f",
"url": "https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a",
"url": "https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a",
"url": "https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/135034",
"url": "https://github.com/python/cpython/issues/135034"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/135037",
"url": "https://github.com/python/cpython/pull/135037"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/"
}
],
"release_date": "2025-06-03T12:58:57.452000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-06T15:26:03+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer RPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:13267"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: python: Extraction filter bypass for linking outside extraction directory"
},
{
"cve": "CVE-2025-4435",
"cwe": {
"id": "CWE-706",
"name": "Use of Incorrectly-Resolved Name or Reference"
},
"discovery_date": "2025-06-03T14:00:46.485917+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2370010"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in CPython\u0027s tarfile module. This vulnerability allows unauthorized file extraction via crafted tar archives when TarFile.errorlevel=0, bypassing expected filtering mechanisms.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: Tarfile extracts filtered members when errorlevel=0",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The severity of this vulnerability was lowered due to the fact that successful exploitation requires the attacker to convince a privileged user or process to extract a malicious tar file. Since tar file extraction typically occurs in trusted contexts or with elevated privileges, the impact is reduced by the requirement of such access.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-706: Use of Incorrectly-Resolved Name or Reference and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess enforcement and least privilege limit resolution of internal objects and services to explicitly authorized users and processes, reducing the risk of unintended interactions.. Configuration settings are tightly managed to ensure consistent and accurate resolution of names, paths, and references across deployments. Least functionality reduces exposure by disabling unused features and restricting access to unnecessary components. Additionally, real-time monitoring detects anomalous behavior or access attempts involving misconfigured or invalid references, enabling timely response and containment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-4435"
},
{
"category": "external",
"summary": "RHBZ#2370010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370010"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4435"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a",
"url": "https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a",
"url": "https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/135034",
"url": "https://github.com/python/cpython/issues/135034"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/135037",
"url": "https://github.com/python/cpython/pull/135037"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/"
}
],
"release_date": "2025-06-03T12:59:06.792000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-06T15:26:03+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer RPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:13267"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpython: Tarfile extracts filtered members when errorlevel=0"
},
{
"cve": "CVE-2025-4517",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-06-03T14:01:12.271192+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2370016"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CPython tarfile module. This vulnerability allows arbitrary filesystem writes outside the extraction directory via extracting untrusted tar archives using the TarFile.extractall() or TarFile.extract() methods with the extraction filter parameter set to \"data\" or \"tar\".",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: Arbitrary writes via tarfile realpath overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The severity of this vulnerability was lowered due to the fact that successful exploitation requires the attacker to convince a privileged user or process to extract a malicious tar file. Since tar file extraction typically occurs in trusted contexts or with elevated privileges, the impact is reduced by the requirement of such access.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-4517"
},
{
"category": "external",
"summary": "RHBZ#2370016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370016"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4517",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4517"
},
{
"category": "external",
"summary": "https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f",
"url": "https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a",
"url": "https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a",
"url": "https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/135034",
"url": "https://github.com/python/cpython/issues/135034"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/135037",
"url": "https://github.com/python/cpython/pull/135037"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/"
}
],
"release_date": "2025-06-03T12:58:50.352000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-06T15:26:03+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer RPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:13267"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "python: cpython: Arbitrary writes via tarfile realpath overflow"
},
{
"acknowledgments": [
{
"names": [
"Ahmed Lekssays"
]
}
],
"cve": "CVE-2025-6021",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-12T07:55:45.428000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372406"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxml2\u0027s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate due to the lack of confidentiality impact and limited integrity concerns, with the main risk being potential denial-of-service from a crash. Exploitation requires crafted XML input and specific application behavior using xmlBuildQName. While it\u2019s a write overflow, modern mitigations make remote code execution unlikely.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6021"
},
{
"category": "external",
"summary": "RHBZ#2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021"
}
],
"release_date": "2025-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-06T15:26:03+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer RPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:13267"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. Users are strongly advised to apply vendor-supplied patches as soon as they become available to address the underlying integer overflow flaw in the affected code.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2"
},
{
"cve": "CVE-2025-6965",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"discovery_date": "2025-07-15T14:02:19.241458+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380149"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sqlite: Integer Truncation in SQLite",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in SQLite is categorized as Important rather than Critical because, although it involves memory corruption, the conditions required to trigger it are relatively constrained. The flaw arises when a query causes the number of aggregate terms to exceed internal limits, leading to potential buffer overflows or memory mismanagement. However, exploitation requires the ability to craft complex SQL queries and interact with the SQLite engine in a specific manner\u2014typically through direct SQL input. There is no known evidence of arbitrary code execution, privilege escalation, or remote exploitability as a direct result of this flaw. Additionally, most SQLite deployments are embedded in applications where input is tightly controlled or sanitized.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6965"
},
{
"category": "external",
"summary": "RHBZ#2380149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380149"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965"
},
{
"category": "external",
"summary": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8",
"url": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8"
}
],
"release_date": "2025-07-15T13:44:00.784000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-06T15:26:03+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer RPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:13267"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sqlite: Integer Truncation in SQLite"
},
{
"acknowledgments": [
{
"names": [
"Sergei Glazunov"
],
"organization": "Google Project Zero"
}
],
"cve": "CVE-2025-7425",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-07-10T09:37:28.172000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2379274"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxslt: Heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This heap-use-after-free vulnerability in libxslt is rated Important because it can lead to memory corruption and application crashes. The flaw arises when internal attribute metadata (atype) is modified by libxslt\u0027s xsltSetSourceNodeFlags() function during processing of result tree fragments. If the flag corruption prevents proper removal of ID references, later memory cleanup routines may operate on already-freed memory. Since libxslt is commonly used in server-side XML processing, this could result in denial-of-service or potentially facilitate code execution under certain memory reuse conditions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-7425"
},
{
"category": "external",
"summary": "RHBZ#2379274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379274"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-7425",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7425"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/140",
"url": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/140"
}
],
"release_date": "2025-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-06T15:26:03+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer RPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:13267"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxslt: Heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr"
},
{
"cve": "CVE-2025-40909",
"cwe": {
"id": "CWE-426",
"name": "Untrusted Search Path"
},
"discovery_date": "2025-05-30T13:00:49.546076+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2369407"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "perl: Perl threads have a working directory race condition where file operations may target unintended paths",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to the successful exploitation of a CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027) or CWE-426: Untrusted Search Path vulnerability, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces least functionality by enabling only essential features, services, and ports to reduce the system\u2019s attack surface. Static code analysis, peer reviews, and robust input validation and error handling detect unsafe input that could affect execution timing or path resolution. Real-time threat detection, including IPS/IDS, antimalware, and continuous system monitoring, enables rapid identification of exploitation attempts. Process isolation reduces the likelihood of concurrent execution conflicts and contains any impact to isolated workloads. Executable search paths are restricted to trusted, explicitly defined directories, mitigating the risk of executing malicious files. These controls effectively lower the likelihood and impact of race conditions and untrusted path exploitation in the environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-40909"
},
{
"category": "external",
"summary": "RHBZ#2369407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369407"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-40909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40909"
},
{
"category": "external",
"summary": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226"
},
{
"category": "external",
"summary": "https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e",
"url": "https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e"
},
{
"category": "external",
"summary": "https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch",
"url": "https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch"
},
{
"category": "external",
"summary": "https://github.com/Perl/perl5/issues/10387",
"url": "https://github.com/Perl/perl5/issues/10387"
},
{
"category": "external",
"summary": "https://github.com/Perl/perl5/issues/23010",
"url": "https://github.com/Perl/perl5/issues/23010"
},
{
"category": "external",
"summary": "https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads",
"url": "https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/05/22/2",
"url": "https://www.openwall.com/lists/oss-security/2025/05/22/2"
}
],
"release_date": "2025-05-30T12:20:11.237000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-06T15:26:03+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer RPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:13267"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "perl: Perl threads have a working directory race condition where file operations may target unintended paths"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-12T00:35:26.470000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372385"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Type confusion leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "RHBZ#2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-06T15:26:03+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer RPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:13267"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:c517869dacaf4d3650310d4a52e83706e0b311d6ebb4a9b37b1c7acff5c142ec_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:18fa5a5b82d77afe7a92e0115daf8c23df0f817d5917747d35212dc7e4c66413_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2020475c1f39087c770ff031c3a4c0b384aa680b1b9a8278ad80d127420ffffc_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Type confusion leads to Denial of service (DoS)"
}
]
}
rhsa-2025:11545
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for perl is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Perl is a high-level programming language that is commonly used for system administration utilities and web programming.\n\nSecurity Fix(es):\n\n* perl: Perl threads have a working directory race condition where file operations may target unintended paths (CVE-2025-40909)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:11545",
"url": "https://access.redhat.com/errata/RHSA-2025:11545"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2369407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369407"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_11545.json"
}
],
"title": "Red Hat Security Advisory: perl security update",
"tracking": {
"current_release_date": "2025-11-06T23:14:29+00:00",
"generator": {
"date": "2025-11-06T23:14:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2025:11545",
"initial_release_date": "2025-07-22T18:22:26+00:00",
"revision_history": [
{
"date": "2025-07-22T18:22:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-22T18:22:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:14:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-4:5.32.1-481.el9_4.1.src",
"product": {
"name": "perl-4:5.32.1-481.el9_4.1.src",
"product_id": "perl-4:5.32.1-481.el9_4.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl@5.32.1-481.el9_4.1?arch=src\u0026epoch=4"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-4:5.32.1-481.el9_4.1.aarch64",
"product": {
"name": "perl-4:5.32.1-481.el9_4.1.aarch64",
"product_id": "perl-4:5.32.1-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl@5.32.1-481.el9_4.1?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-0:1.80-481.el9_4.1.aarch64",
"product": {
"name": "perl-B-0:1.80-481.el9_4.1.aarch64",
"product_id": "perl-B-0:1.80-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B@1.80-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-0:1.28-481.el9_4.1.aarch64",
"product": {
"name": "perl-Devel-Peek-0:1.28-481.el9_4.1.aarch64",
"product_id": "perl-Devel-Peek-0:1.28-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek@1.28-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-DynaLoader-0:1.47-481.el9_4.1.aarch64",
"product": {
"name": "perl-DynaLoader-0:1.47-481.el9_4.1.aarch64",
"product_id": "perl-DynaLoader-0:1.47-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-DynaLoader@1.47-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Errno-0:1.30-481.el9_4.1.aarch64",
"product": {
"name": "perl-Errno-0:1.30-481.el9_4.1.aarch64",
"product_id": "perl-Errno-0:1.30-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Errno@1.30-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-0:1.13-481.el9_4.1.aarch64",
"product": {
"name": "perl-Fcntl-0:1.13-481.el9_4.1.aarch64",
"product_id": "perl-Fcntl-0:1.13-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl@1.13-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-0:1.12-481.el9_4.1.aarch64",
"product": {
"name": "perl-File-DosGlob-0:1.12-481.el9_4.1.aarch64",
"product_id": "perl-File-DosGlob-0:1.12-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob@1.12-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-0:1.18-481.el9_4.1.aarch64",
"product": {
"name": "perl-GDBM_File-0:1.18-481.el9_4.1.aarch64",
"product_id": "perl-GDBM_File-0:1.18-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File@1.18-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-0:0.23-481.el9_4.1.aarch64",
"product": {
"name": "perl-Hash-Util-0:0.23-481.el9_4.1.aarch64",
"product_id": "perl-Hash-Util-0:0.23-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util@0.23-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.aarch64",
"product": {
"name": "perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.aarch64",
"product_id": "perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash@1.20-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-0:0.19-481.el9_4.1.aarch64",
"product": {
"name": "perl-I18N-Langinfo-0:0.19-481.el9_4.1.aarch64",
"product_id": "perl-I18N-Langinfo-0:0.19-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo@0.19-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-IO-0:1.43-481.el9_4.1.aarch64",
"product": {
"name": "perl-IO-0:1.43-481.el9_4.1.aarch64",
"product_id": "perl-IO-0:1.43-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO@1.43-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-0:1.15-481.el9_4.1.aarch64",
"product": {
"name": "perl-NDBM_File-0:1.15-481.el9_4.1.aarch64",
"product_id": "perl-NDBM_File-0:1.15-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File@1.15-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-0:1.16-481.el9_4.1.aarch64",
"product": {
"name": "perl-ODBM_File-0:1.16-481.el9_4.1.aarch64",
"product_id": "perl-ODBM_File-0:1.16-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File@1.16-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-0:1.48-481.el9_4.1.aarch64",
"product": {
"name": "perl-Opcode-0:1.48-481.el9_4.1.aarch64",
"product_id": "perl-Opcode-0:1.48-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode@1.48-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-0:1.94-481.el9_4.1.aarch64",
"product": {
"name": "perl-POSIX-0:1.94-481.el9_4.1.aarch64",
"product_id": "perl-POSIX-0:1.94-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX@1.94-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-0:1.23-481.el9_4.1.aarch64",
"product": {
"name": "perl-Sys-Hostname-0:1.23-481.el9_4.1.aarch64",
"product_id": "perl-Sys-Hostname-0:1.23-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname@1.23-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-0:1.3401-481.el9_4.1.aarch64",
"product": {
"name": "perl-Time-Piece-0:1.3401-481.el9_4.1.aarch64",
"product_id": "perl-Time-Piece-0:1.3401-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece@1.3401-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-devel-4:5.32.1-481.el9_4.1.aarch64",
"product": {
"name": "perl-devel-4:5.32.1-481.el9_4.1.aarch64",
"product_id": "perl-devel-4:5.32.1-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-devel@5.32.1-481.el9_4.1?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-4:5.32.1-481.el9_4.1.aarch64",
"product": {
"name": "perl-interpreter-4:5.32.1-481.el9_4.1.aarch64",
"product_id": "perl-interpreter-4:5.32.1-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter@5.32.1-481.el9_4.1?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-lib-0:0.65-481.el9_4.1.aarch64",
"product": {
"name": "perl-lib-0:0.65-481.el9_4.1.aarch64",
"product_id": "perl-lib-0:0.65-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-lib@0.65-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-libs-4:5.32.1-481.el9_4.1.aarch64",
"product": {
"name": "perl-libs-4:5.32.1-481.el9_4.1.aarch64",
"product_id": "perl-libs-4:5.32.1-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs@5.32.1-481.el9_4.1?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-0:1.23-481.el9_4.1.aarch64",
"product": {
"name": "perl-mro-0:1.23-481.el9_4.1.aarch64",
"product_id": "perl-mro-0:1.23-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro@1.23-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-ph-0:5.32.1-481.el9_4.1.aarch64",
"product": {
"name": "perl-ph-0:5.32.1-481.el9_4.1.aarch64",
"product_id": "perl-ph-0:5.32.1-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ph@5.32.1-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-debugsource-4:5.32.1-481.el9_4.1.aarch64",
"product": {
"name": "perl-debugsource-4:5.32.1-481.el9_4.1.aarch64",
"product_id": "perl-debugsource-4:5.32.1-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debugsource@5.32.1-481.el9_4.1?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-debuginfo-0:1.80-481.el9_4.1.aarch64",
"product": {
"name": "perl-B-debuginfo-0:1.80-481.el9_4.1.aarch64",
"product_id": "perl-B-debuginfo-0:1.80-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B-debuginfo@1.80-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.aarch64",
"product": {
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.aarch64",
"product_id": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek-debuginfo@1.28-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.aarch64",
"product": {
"name": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.aarch64",
"product_id": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl-debuginfo@1.13-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.aarch64",
"product": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.aarch64",
"product_id": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob-debuginfo@1.12-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.aarch64",
"product": {
"name": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.aarch64",
"product_id": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File-debuginfo@1.18-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.aarch64",
"product": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.aarch64",
"product_id": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash-debuginfo@1.20-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.aarch64",
"product": {
"name": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.aarch64",
"product_id": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-debuginfo@0.23-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.aarch64",
"product": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.aarch64",
"product_id": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo-debuginfo@0.19-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-IO-debuginfo-0:1.43-481.el9_4.1.aarch64",
"product": {
"name": "perl-IO-debuginfo-0:1.43-481.el9_4.1.aarch64",
"product_id": "perl-IO-debuginfo-0:1.43-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO-debuginfo@1.43-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.aarch64",
"product": {
"name": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.aarch64",
"product_id": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File-debuginfo@1.15-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.aarch64",
"product": {
"name": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.aarch64",
"product_id": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File-debuginfo@1.16-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.aarch64",
"product": {
"name": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.aarch64",
"product_id": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode-debuginfo@1.48-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.aarch64",
"product": {
"name": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.aarch64",
"product_id": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX-debuginfo@1.94-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.aarch64",
"product": {
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.aarch64",
"product_id": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname-debuginfo@1.23-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.aarch64",
"product": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.aarch64",
"product_id": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece-debuginfo@1.3401-481.el9_4.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"product": {
"name": "perl-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"product_id": "perl-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debuginfo@5.32.1-481.el9_4.1?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"product": {
"name": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"product_id": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter-debuginfo@5.32.1-481.el9_4.1?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"product": {
"name": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"product_id": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs-debuginfo@5.32.1-481.el9_4.1?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-debuginfo-0:1.23-481.el9_4.1.aarch64",
"product": {
"name": "perl-mro-debuginfo-0:1.23-481.el9_4.1.aarch64",
"product_id": "perl-mro-debuginfo-0:1.23-481.el9_4.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro-debuginfo@1.23-481.el9_4.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-4:5.32.1-481.el9_4.1.ppc64le",
"product": {
"name": "perl-4:5.32.1-481.el9_4.1.ppc64le",
"product_id": "perl-4:5.32.1-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl@5.32.1-481.el9_4.1?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-0:1.80-481.el9_4.1.ppc64le",
"product": {
"name": "perl-B-0:1.80-481.el9_4.1.ppc64le",
"product_id": "perl-B-0:1.80-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B@1.80-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-0:1.28-481.el9_4.1.ppc64le",
"product": {
"name": "perl-Devel-Peek-0:1.28-481.el9_4.1.ppc64le",
"product_id": "perl-Devel-Peek-0:1.28-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek@1.28-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-DynaLoader-0:1.47-481.el9_4.1.ppc64le",
"product": {
"name": "perl-DynaLoader-0:1.47-481.el9_4.1.ppc64le",
"product_id": "perl-DynaLoader-0:1.47-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-DynaLoader@1.47-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Errno-0:1.30-481.el9_4.1.ppc64le",
"product": {
"name": "perl-Errno-0:1.30-481.el9_4.1.ppc64le",
"product_id": "perl-Errno-0:1.30-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Errno@1.30-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-0:1.13-481.el9_4.1.ppc64le",
"product": {
"name": "perl-Fcntl-0:1.13-481.el9_4.1.ppc64le",
"product_id": "perl-Fcntl-0:1.13-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl@1.13-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-0:1.12-481.el9_4.1.ppc64le",
"product": {
"name": "perl-File-DosGlob-0:1.12-481.el9_4.1.ppc64le",
"product_id": "perl-File-DosGlob-0:1.12-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob@1.12-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-0:1.18-481.el9_4.1.ppc64le",
"product": {
"name": "perl-GDBM_File-0:1.18-481.el9_4.1.ppc64le",
"product_id": "perl-GDBM_File-0:1.18-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File@1.18-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-0:0.23-481.el9_4.1.ppc64le",
"product": {
"name": "perl-Hash-Util-0:0.23-481.el9_4.1.ppc64le",
"product_id": "perl-Hash-Util-0:0.23-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util@0.23-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.ppc64le",
"product": {
"name": "perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.ppc64le",
"product_id": "perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash@1.20-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-0:0.19-481.el9_4.1.ppc64le",
"product": {
"name": "perl-I18N-Langinfo-0:0.19-481.el9_4.1.ppc64le",
"product_id": "perl-I18N-Langinfo-0:0.19-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo@0.19-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-IO-0:1.43-481.el9_4.1.ppc64le",
"product": {
"name": "perl-IO-0:1.43-481.el9_4.1.ppc64le",
"product_id": "perl-IO-0:1.43-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO@1.43-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-0:1.15-481.el9_4.1.ppc64le",
"product": {
"name": "perl-NDBM_File-0:1.15-481.el9_4.1.ppc64le",
"product_id": "perl-NDBM_File-0:1.15-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File@1.15-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-0:1.16-481.el9_4.1.ppc64le",
"product": {
"name": "perl-ODBM_File-0:1.16-481.el9_4.1.ppc64le",
"product_id": "perl-ODBM_File-0:1.16-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File@1.16-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-0:1.48-481.el9_4.1.ppc64le",
"product": {
"name": "perl-Opcode-0:1.48-481.el9_4.1.ppc64le",
"product_id": "perl-Opcode-0:1.48-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode@1.48-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-0:1.94-481.el9_4.1.ppc64le",
"product": {
"name": "perl-POSIX-0:1.94-481.el9_4.1.ppc64le",
"product_id": "perl-POSIX-0:1.94-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX@1.94-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-0:1.23-481.el9_4.1.ppc64le",
"product": {
"name": "perl-Sys-Hostname-0:1.23-481.el9_4.1.ppc64le",
"product_id": "perl-Sys-Hostname-0:1.23-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname@1.23-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-0:1.3401-481.el9_4.1.ppc64le",
"product": {
"name": "perl-Time-Piece-0:1.3401-481.el9_4.1.ppc64le",
"product_id": "perl-Time-Piece-0:1.3401-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece@1.3401-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-devel-4:5.32.1-481.el9_4.1.ppc64le",
"product": {
"name": "perl-devel-4:5.32.1-481.el9_4.1.ppc64le",
"product_id": "perl-devel-4:5.32.1-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-devel@5.32.1-481.el9_4.1?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-4:5.32.1-481.el9_4.1.ppc64le",
"product": {
"name": "perl-interpreter-4:5.32.1-481.el9_4.1.ppc64le",
"product_id": "perl-interpreter-4:5.32.1-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter@5.32.1-481.el9_4.1?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-lib-0:0.65-481.el9_4.1.ppc64le",
"product": {
"name": "perl-lib-0:0.65-481.el9_4.1.ppc64le",
"product_id": "perl-lib-0:0.65-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-lib@0.65-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-libs-4:5.32.1-481.el9_4.1.ppc64le",
"product": {
"name": "perl-libs-4:5.32.1-481.el9_4.1.ppc64le",
"product_id": "perl-libs-4:5.32.1-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs@5.32.1-481.el9_4.1?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-0:1.23-481.el9_4.1.ppc64le",
"product": {
"name": "perl-mro-0:1.23-481.el9_4.1.ppc64le",
"product_id": "perl-mro-0:1.23-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro@1.23-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-ph-0:5.32.1-481.el9_4.1.ppc64le",
"product": {
"name": "perl-ph-0:5.32.1-481.el9_4.1.ppc64le",
"product_id": "perl-ph-0:5.32.1-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ph@5.32.1-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-debugsource-4:5.32.1-481.el9_4.1.ppc64le",
"product": {
"name": "perl-debugsource-4:5.32.1-481.el9_4.1.ppc64le",
"product_id": "perl-debugsource-4:5.32.1-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debugsource@5.32.1-481.el9_4.1?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-debuginfo-0:1.80-481.el9_4.1.ppc64le",
"product": {
"name": "perl-B-debuginfo-0:1.80-481.el9_4.1.ppc64le",
"product_id": "perl-B-debuginfo-0:1.80-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B-debuginfo@1.80-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.ppc64le",
"product": {
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.ppc64le",
"product_id": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek-debuginfo@1.28-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.ppc64le",
"product": {
"name": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.ppc64le",
"product_id": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl-debuginfo@1.13-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.ppc64le",
"product": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.ppc64le",
"product_id": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob-debuginfo@1.12-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.ppc64le",
"product": {
"name": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.ppc64le",
"product_id": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File-debuginfo@1.18-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.ppc64le",
"product": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.ppc64le",
"product_id": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash-debuginfo@1.20-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.ppc64le",
"product": {
"name": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.ppc64le",
"product_id": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-debuginfo@0.23-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.ppc64le",
"product": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.ppc64le",
"product_id": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo-debuginfo@0.19-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-IO-debuginfo-0:1.43-481.el9_4.1.ppc64le",
"product": {
"name": "perl-IO-debuginfo-0:1.43-481.el9_4.1.ppc64le",
"product_id": "perl-IO-debuginfo-0:1.43-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO-debuginfo@1.43-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.ppc64le",
"product": {
"name": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.ppc64le",
"product_id": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File-debuginfo@1.15-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.ppc64le",
"product": {
"name": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.ppc64le",
"product_id": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File-debuginfo@1.16-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.ppc64le",
"product": {
"name": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.ppc64le",
"product_id": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode-debuginfo@1.48-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.ppc64le",
"product": {
"name": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.ppc64le",
"product_id": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX-debuginfo@1.94-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.ppc64le",
"product": {
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.ppc64le",
"product_id": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname-debuginfo@1.23-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.ppc64le",
"product": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.ppc64le",
"product_id": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece-debuginfo@1.3401-481.el9_4.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"product": {
"name": "perl-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"product_id": "perl-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debuginfo@5.32.1-481.el9_4.1?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"product": {
"name": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"product_id": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter-debuginfo@5.32.1-481.el9_4.1?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"product": {
"name": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"product_id": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs-debuginfo@5.32.1-481.el9_4.1?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-debuginfo-0:1.23-481.el9_4.1.ppc64le",
"product": {
"name": "perl-mro-debuginfo-0:1.23-481.el9_4.1.ppc64le",
"product_id": "perl-mro-debuginfo-0:1.23-481.el9_4.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro-debuginfo@1.23-481.el9_4.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-4:5.32.1-481.el9_4.1.x86_64",
"product": {
"name": "perl-4:5.32.1-481.el9_4.1.x86_64",
"product_id": "perl-4:5.32.1-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl@5.32.1-481.el9_4.1?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-0:1.80-481.el9_4.1.x86_64",
"product": {
"name": "perl-B-0:1.80-481.el9_4.1.x86_64",
"product_id": "perl-B-0:1.80-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B@1.80-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-0:1.28-481.el9_4.1.x86_64",
"product": {
"name": "perl-Devel-Peek-0:1.28-481.el9_4.1.x86_64",
"product_id": "perl-Devel-Peek-0:1.28-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek@1.28-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-DynaLoader-0:1.47-481.el9_4.1.x86_64",
"product": {
"name": "perl-DynaLoader-0:1.47-481.el9_4.1.x86_64",
"product_id": "perl-DynaLoader-0:1.47-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-DynaLoader@1.47-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Errno-0:1.30-481.el9_4.1.x86_64",
"product": {
"name": "perl-Errno-0:1.30-481.el9_4.1.x86_64",
"product_id": "perl-Errno-0:1.30-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Errno@1.30-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-0:1.13-481.el9_4.1.x86_64",
"product": {
"name": "perl-Fcntl-0:1.13-481.el9_4.1.x86_64",
"product_id": "perl-Fcntl-0:1.13-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl@1.13-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-0:1.12-481.el9_4.1.x86_64",
"product": {
"name": "perl-File-DosGlob-0:1.12-481.el9_4.1.x86_64",
"product_id": "perl-File-DosGlob-0:1.12-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob@1.12-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-0:1.18-481.el9_4.1.x86_64",
"product": {
"name": "perl-GDBM_File-0:1.18-481.el9_4.1.x86_64",
"product_id": "perl-GDBM_File-0:1.18-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File@1.18-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-0:0.23-481.el9_4.1.x86_64",
"product": {
"name": "perl-Hash-Util-0:0.23-481.el9_4.1.x86_64",
"product_id": "perl-Hash-Util-0:0.23-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util@0.23-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.x86_64",
"product": {
"name": "perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.x86_64",
"product_id": "perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash@1.20-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-0:0.19-481.el9_4.1.x86_64",
"product": {
"name": "perl-I18N-Langinfo-0:0.19-481.el9_4.1.x86_64",
"product_id": "perl-I18N-Langinfo-0:0.19-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo@0.19-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-IO-0:1.43-481.el9_4.1.x86_64",
"product": {
"name": "perl-IO-0:1.43-481.el9_4.1.x86_64",
"product_id": "perl-IO-0:1.43-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO@1.43-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-0:1.15-481.el9_4.1.x86_64",
"product": {
"name": "perl-NDBM_File-0:1.15-481.el9_4.1.x86_64",
"product_id": "perl-NDBM_File-0:1.15-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File@1.15-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-0:1.16-481.el9_4.1.x86_64",
"product": {
"name": "perl-ODBM_File-0:1.16-481.el9_4.1.x86_64",
"product_id": "perl-ODBM_File-0:1.16-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File@1.16-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-0:1.48-481.el9_4.1.x86_64",
"product": {
"name": "perl-Opcode-0:1.48-481.el9_4.1.x86_64",
"product_id": "perl-Opcode-0:1.48-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode@1.48-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-0:1.94-481.el9_4.1.x86_64",
"product": {
"name": "perl-POSIX-0:1.94-481.el9_4.1.x86_64",
"product_id": "perl-POSIX-0:1.94-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX@1.94-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-0:1.23-481.el9_4.1.x86_64",
"product": {
"name": "perl-Sys-Hostname-0:1.23-481.el9_4.1.x86_64",
"product_id": "perl-Sys-Hostname-0:1.23-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname@1.23-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-0:1.3401-481.el9_4.1.x86_64",
"product": {
"name": "perl-Time-Piece-0:1.3401-481.el9_4.1.x86_64",
"product_id": "perl-Time-Piece-0:1.3401-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece@1.3401-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-devel-4:5.32.1-481.el9_4.1.x86_64",
"product": {
"name": "perl-devel-4:5.32.1-481.el9_4.1.x86_64",
"product_id": "perl-devel-4:5.32.1-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-devel@5.32.1-481.el9_4.1?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-4:5.32.1-481.el9_4.1.x86_64",
"product": {
"name": "perl-interpreter-4:5.32.1-481.el9_4.1.x86_64",
"product_id": "perl-interpreter-4:5.32.1-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter@5.32.1-481.el9_4.1?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-lib-0:0.65-481.el9_4.1.x86_64",
"product": {
"name": "perl-lib-0:0.65-481.el9_4.1.x86_64",
"product_id": "perl-lib-0:0.65-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-lib@0.65-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-libs-4:5.32.1-481.el9_4.1.x86_64",
"product": {
"name": "perl-libs-4:5.32.1-481.el9_4.1.x86_64",
"product_id": "perl-libs-4:5.32.1-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs@5.32.1-481.el9_4.1?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-0:1.23-481.el9_4.1.x86_64",
"product": {
"name": "perl-mro-0:1.23-481.el9_4.1.x86_64",
"product_id": "perl-mro-0:1.23-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro@1.23-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-ph-0:5.32.1-481.el9_4.1.x86_64",
"product": {
"name": "perl-ph-0:5.32.1-481.el9_4.1.x86_64",
"product_id": "perl-ph-0:5.32.1-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ph@5.32.1-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-debugsource-4:5.32.1-481.el9_4.1.x86_64",
"product": {
"name": "perl-debugsource-4:5.32.1-481.el9_4.1.x86_64",
"product_id": "perl-debugsource-4:5.32.1-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debugsource@5.32.1-481.el9_4.1?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-debuginfo-0:1.80-481.el9_4.1.x86_64",
"product": {
"name": "perl-B-debuginfo-0:1.80-481.el9_4.1.x86_64",
"product_id": "perl-B-debuginfo-0:1.80-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B-debuginfo@1.80-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.x86_64",
"product": {
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.x86_64",
"product_id": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek-debuginfo@1.28-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.x86_64",
"product": {
"name": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.x86_64",
"product_id": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl-debuginfo@1.13-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.x86_64",
"product": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.x86_64",
"product_id": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob-debuginfo@1.12-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.x86_64",
"product": {
"name": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.x86_64",
"product_id": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File-debuginfo@1.18-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.x86_64",
"product": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.x86_64",
"product_id": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash-debuginfo@1.20-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.x86_64",
"product": {
"name": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.x86_64",
"product_id": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-debuginfo@0.23-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.x86_64",
"product": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.x86_64",
"product_id": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo-debuginfo@0.19-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-IO-debuginfo-0:1.43-481.el9_4.1.x86_64",
"product": {
"name": "perl-IO-debuginfo-0:1.43-481.el9_4.1.x86_64",
"product_id": "perl-IO-debuginfo-0:1.43-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO-debuginfo@1.43-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.x86_64",
"product": {
"name": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.x86_64",
"product_id": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File-debuginfo@1.15-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.x86_64",
"product": {
"name": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.x86_64",
"product_id": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File-debuginfo@1.16-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.x86_64",
"product": {
"name": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.x86_64",
"product_id": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode-debuginfo@1.48-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.x86_64",
"product": {
"name": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.x86_64",
"product_id": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX-debuginfo@1.94-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.x86_64",
"product": {
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.x86_64",
"product_id": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname-debuginfo@1.23-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.x86_64",
"product": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.x86_64",
"product_id": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece-debuginfo@1.3401-481.el9_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"product": {
"name": "perl-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"product_id": "perl-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debuginfo@5.32.1-481.el9_4.1?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"product": {
"name": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"product_id": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter-debuginfo@5.32.1-481.el9_4.1?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"product": {
"name": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"product_id": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs-debuginfo@5.32.1-481.el9_4.1?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-debuginfo-0:1.23-481.el9_4.1.x86_64",
"product": {
"name": "perl-mro-debuginfo-0:1.23-481.el9_4.1.x86_64",
"product_id": "perl-mro-debuginfo-0:1.23-481.el9_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro-debuginfo@1.23-481.el9_4.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-devel-4:5.32.1-481.el9_4.1.i686",
"product": {
"name": "perl-devel-4:5.32.1-481.el9_4.1.i686",
"product_id": "perl-devel-4:5.32.1-481.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-devel@5.32.1-481.el9_4.1?arch=i686\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-4:5.32.1-481.el9_4.1.i686",
"product": {
"name": "perl-libs-4:5.32.1-481.el9_4.1.i686",
"product_id": "perl-libs-4:5.32.1-481.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs@5.32.1-481.el9_4.1?arch=i686\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-debugsource-4:5.32.1-481.el9_4.1.i686",
"product": {
"name": "perl-debugsource-4:5.32.1-481.el9_4.1.i686",
"product_id": "perl-debugsource-4:5.32.1-481.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debugsource@5.32.1-481.el9_4.1?arch=i686\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-debuginfo-0:1.80-481.el9_4.1.i686",
"product": {
"name": "perl-B-debuginfo-0:1.80-481.el9_4.1.i686",
"product_id": "perl-B-debuginfo-0:1.80-481.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B-debuginfo@1.80-481.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.i686",
"product": {
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.i686",
"product_id": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek-debuginfo@1.28-481.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.i686",
"product": {
"name": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.i686",
"product_id": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl-debuginfo@1.13-481.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.i686",
"product": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.i686",
"product_id": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob-debuginfo@1.12-481.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.i686",
"product": {
"name": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.i686",
"product_id": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File-debuginfo@1.18-481.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.i686",
"product": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.i686",
"product_id": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash-debuginfo@1.20-481.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.i686",
"product": {
"name": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.i686",
"product_id": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-debuginfo@0.23-481.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.i686",
"product": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.i686",
"product_id": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo-debuginfo@0.19-481.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-IO-debuginfo-0:1.43-481.el9_4.1.i686",
"product": {
"name": "perl-IO-debuginfo-0:1.43-481.el9_4.1.i686",
"product_id": "perl-IO-debuginfo-0:1.43-481.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO-debuginfo@1.43-481.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.i686",
"product": {
"name": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.i686",
"product_id": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File-debuginfo@1.15-481.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.i686",
"product": {
"name": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.i686",
"product_id": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File-debuginfo@1.16-481.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.i686",
"product": {
"name": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.i686",
"product_id": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode-debuginfo@1.48-481.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.i686",
"product": {
"name": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.i686",
"product_id": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX-debuginfo@1.94-481.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.i686",
"product": {
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.i686",
"product_id": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname-debuginfo@1.23-481.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.i686",
"product": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.i686",
"product_id": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece-debuginfo@1.3401-481.el9_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-debuginfo-4:5.32.1-481.el9_4.1.i686",
"product": {
"name": "perl-debuginfo-4:5.32.1-481.el9_4.1.i686",
"product_id": "perl-debuginfo-4:5.32.1-481.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debuginfo@5.32.1-481.el9_4.1?arch=i686\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.i686",
"product": {
"name": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.i686",
"product_id": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter-debuginfo@5.32.1-481.el9_4.1?arch=i686\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.i686",
"product": {
"name": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.i686",
"product_id": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs-debuginfo@5.32.1-481.el9_4.1?arch=i686\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-debuginfo-0:1.23-481.el9_4.1.i686",
"product": {
"name": "perl-mro-debuginfo-0:1.23-481.el9_4.1.i686",
"product_id": "perl-mro-debuginfo-0:1.23-481.el9_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro-debuginfo@1.23-481.el9_4.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-4:5.32.1-481.el9_4.1.s390x",
"product": {
"name": "perl-4:5.32.1-481.el9_4.1.s390x",
"product_id": "perl-4:5.32.1-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl@5.32.1-481.el9_4.1?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-0:1.80-481.el9_4.1.s390x",
"product": {
"name": "perl-B-0:1.80-481.el9_4.1.s390x",
"product_id": "perl-B-0:1.80-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B@1.80-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-0:1.28-481.el9_4.1.s390x",
"product": {
"name": "perl-Devel-Peek-0:1.28-481.el9_4.1.s390x",
"product_id": "perl-Devel-Peek-0:1.28-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek@1.28-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-DynaLoader-0:1.47-481.el9_4.1.s390x",
"product": {
"name": "perl-DynaLoader-0:1.47-481.el9_4.1.s390x",
"product_id": "perl-DynaLoader-0:1.47-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-DynaLoader@1.47-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Errno-0:1.30-481.el9_4.1.s390x",
"product": {
"name": "perl-Errno-0:1.30-481.el9_4.1.s390x",
"product_id": "perl-Errno-0:1.30-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Errno@1.30-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-0:1.13-481.el9_4.1.s390x",
"product": {
"name": "perl-Fcntl-0:1.13-481.el9_4.1.s390x",
"product_id": "perl-Fcntl-0:1.13-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl@1.13-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-0:1.12-481.el9_4.1.s390x",
"product": {
"name": "perl-File-DosGlob-0:1.12-481.el9_4.1.s390x",
"product_id": "perl-File-DosGlob-0:1.12-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob@1.12-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-0:1.18-481.el9_4.1.s390x",
"product": {
"name": "perl-GDBM_File-0:1.18-481.el9_4.1.s390x",
"product_id": "perl-GDBM_File-0:1.18-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File@1.18-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-0:0.23-481.el9_4.1.s390x",
"product": {
"name": "perl-Hash-Util-0:0.23-481.el9_4.1.s390x",
"product_id": "perl-Hash-Util-0:0.23-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util@0.23-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.s390x",
"product": {
"name": "perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.s390x",
"product_id": "perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash@1.20-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-0:0.19-481.el9_4.1.s390x",
"product": {
"name": "perl-I18N-Langinfo-0:0.19-481.el9_4.1.s390x",
"product_id": "perl-I18N-Langinfo-0:0.19-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo@0.19-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-IO-0:1.43-481.el9_4.1.s390x",
"product": {
"name": "perl-IO-0:1.43-481.el9_4.1.s390x",
"product_id": "perl-IO-0:1.43-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO@1.43-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-0:1.15-481.el9_4.1.s390x",
"product": {
"name": "perl-NDBM_File-0:1.15-481.el9_4.1.s390x",
"product_id": "perl-NDBM_File-0:1.15-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File@1.15-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-0:1.16-481.el9_4.1.s390x",
"product": {
"name": "perl-ODBM_File-0:1.16-481.el9_4.1.s390x",
"product_id": "perl-ODBM_File-0:1.16-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File@1.16-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-0:1.48-481.el9_4.1.s390x",
"product": {
"name": "perl-Opcode-0:1.48-481.el9_4.1.s390x",
"product_id": "perl-Opcode-0:1.48-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode@1.48-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-0:1.94-481.el9_4.1.s390x",
"product": {
"name": "perl-POSIX-0:1.94-481.el9_4.1.s390x",
"product_id": "perl-POSIX-0:1.94-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX@1.94-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-0:1.23-481.el9_4.1.s390x",
"product": {
"name": "perl-Sys-Hostname-0:1.23-481.el9_4.1.s390x",
"product_id": "perl-Sys-Hostname-0:1.23-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname@1.23-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-0:1.3401-481.el9_4.1.s390x",
"product": {
"name": "perl-Time-Piece-0:1.3401-481.el9_4.1.s390x",
"product_id": "perl-Time-Piece-0:1.3401-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece@1.3401-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-devel-4:5.32.1-481.el9_4.1.s390x",
"product": {
"name": "perl-devel-4:5.32.1-481.el9_4.1.s390x",
"product_id": "perl-devel-4:5.32.1-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-devel@5.32.1-481.el9_4.1?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-4:5.32.1-481.el9_4.1.s390x",
"product": {
"name": "perl-interpreter-4:5.32.1-481.el9_4.1.s390x",
"product_id": "perl-interpreter-4:5.32.1-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter@5.32.1-481.el9_4.1?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-lib-0:0.65-481.el9_4.1.s390x",
"product": {
"name": "perl-lib-0:0.65-481.el9_4.1.s390x",
"product_id": "perl-lib-0:0.65-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-lib@0.65-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-libs-4:5.32.1-481.el9_4.1.s390x",
"product": {
"name": "perl-libs-4:5.32.1-481.el9_4.1.s390x",
"product_id": "perl-libs-4:5.32.1-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs@5.32.1-481.el9_4.1?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-0:1.23-481.el9_4.1.s390x",
"product": {
"name": "perl-mro-0:1.23-481.el9_4.1.s390x",
"product_id": "perl-mro-0:1.23-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro@1.23-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-ph-0:5.32.1-481.el9_4.1.s390x",
"product": {
"name": "perl-ph-0:5.32.1-481.el9_4.1.s390x",
"product_id": "perl-ph-0:5.32.1-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ph@5.32.1-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-debugsource-4:5.32.1-481.el9_4.1.s390x",
"product": {
"name": "perl-debugsource-4:5.32.1-481.el9_4.1.s390x",
"product_id": "perl-debugsource-4:5.32.1-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debugsource@5.32.1-481.el9_4.1?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-debuginfo-0:1.80-481.el9_4.1.s390x",
"product": {
"name": "perl-B-debuginfo-0:1.80-481.el9_4.1.s390x",
"product_id": "perl-B-debuginfo-0:1.80-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B-debuginfo@1.80-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.s390x",
"product": {
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.s390x",
"product_id": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek-debuginfo@1.28-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.s390x",
"product": {
"name": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.s390x",
"product_id": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl-debuginfo@1.13-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.s390x",
"product": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.s390x",
"product_id": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob-debuginfo@1.12-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.s390x",
"product": {
"name": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.s390x",
"product_id": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File-debuginfo@1.18-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.s390x",
"product": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.s390x",
"product_id": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash-debuginfo@1.20-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.s390x",
"product": {
"name": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.s390x",
"product_id": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-debuginfo@0.23-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.s390x",
"product": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.s390x",
"product_id": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo-debuginfo@0.19-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-IO-debuginfo-0:1.43-481.el9_4.1.s390x",
"product": {
"name": "perl-IO-debuginfo-0:1.43-481.el9_4.1.s390x",
"product_id": "perl-IO-debuginfo-0:1.43-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO-debuginfo@1.43-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.s390x",
"product": {
"name": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.s390x",
"product_id": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File-debuginfo@1.15-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.s390x",
"product": {
"name": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.s390x",
"product_id": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File-debuginfo@1.16-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.s390x",
"product": {
"name": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.s390x",
"product_id": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode-debuginfo@1.48-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.s390x",
"product": {
"name": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.s390x",
"product_id": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX-debuginfo@1.94-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.s390x",
"product": {
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.s390x",
"product_id": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname-debuginfo@1.23-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.s390x",
"product": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.s390x",
"product_id": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece-debuginfo@1.3401-481.el9_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"product": {
"name": "perl-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"product_id": "perl-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debuginfo@5.32.1-481.el9_4.1?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"product": {
"name": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"product_id": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter-debuginfo@5.32.1-481.el9_4.1?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"product": {
"name": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"product_id": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs-debuginfo@5.32.1-481.el9_4.1?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-debuginfo-0:1.23-481.el9_4.1.s390x",
"product": {
"name": "perl-mro-debuginfo-0:1.23-481.el9_4.1.s390x",
"product_id": "perl-mro-debuginfo-0:1.23-481.el9_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro-debuginfo@1.23-481.el9_4.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-Attribute-Handlers-0:1.01-481.el9_4.1.noarch",
"product": {
"name": "perl-Attribute-Handlers-0:1.01-481.el9_4.1.noarch",
"product_id": "perl-Attribute-Handlers-0:1.01-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Attribute-Handlers@1.01-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-AutoLoader-0:5.74-481.el9_4.1.noarch",
"product": {
"name": "perl-AutoLoader-0:5.74-481.el9_4.1.noarch",
"product_id": "perl-AutoLoader-0:5.74-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-AutoLoader@5.74-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-AutoSplit-0:5.74-481.el9_4.1.noarch",
"product": {
"name": "perl-AutoSplit-0:5.74-481.el9_4.1.noarch",
"product_id": "perl-AutoSplit-0:5.74-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-AutoSplit@5.74-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Benchmark-0:1.23-481.el9_4.1.noarch",
"product": {
"name": "perl-Benchmark-0:1.23-481.el9_4.1.noarch",
"product_id": "perl-Benchmark-0:1.23-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Benchmark@1.23-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Class-Struct-0:0.66-481.el9_4.1.noarch",
"product": {
"name": "perl-Class-Struct-0:0.66-481.el9_4.1.noarch",
"product_id": "perl-Class-Struct-0:0.66-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Class-Struct@0.66-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Config-Extensions-0:0.03-481.el9_4.1.noarch",
"product": {
"name": "perl-Config-Extensions-0:0.03-481.el9_4.1.noarch",
"product_id": "perl-Config-Extensions-0:0.03-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Config-Extensions@0.03-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-DBM_Filter-0:0.06-481.el9_4.1.noarch",
"product": {
"name": "perl-DBM_Filter-0:0.06-481.el9_4.1.noarch",
"product_id": "perl-DBM_Filter-0:0.06-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-DBM_Filter@0.06-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-SelfStubber-0:1.06-481.el9_4.1.noarch",
"product": {
"name": "perl-Devel-SelfStubber-0:1.06-481.el9_4.1.noarch",
"product_id": "perl-Devel-SelfStubber-0:1.06-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-SelfStubber@1.06-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-DirHandle-0:1.05-481.el9_4.1.noarch",
"product": {
"name": "perl-DirHandle-0:1.05-481.el9_4.1.noarch",
"product_id": "perl-DirHandle-0:1.05-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-DirHandle@1.05-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Dumpvalue-0:2.27-481.el9_4.1.noarch",
"product": {
"name": "perl-Dumpvalue-0:2.27-481.el9_4.1.noarch",
"product_id": "perl-Dumpvalue-0:2.27-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Dumpvalue@2.27-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-English-0:1.11-481.el9_4.1.noarch",
"product": {
"name": "perl-English-0:1.11-481.el9_4.1.noarch",
"product_id": "perl-English-0:1.11-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-English@1.11-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-ExtUtils-Constant-0:0.25-481.el9_4.1.noarch",
"product": {
"name": "perl-ExtUtils-Constant-0:0.25-481.el9_4.1.noarch",
"product_id": "perl-ExtUtils-Constant-0:0.25-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ExtUtils-Constant@0.25-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-ExtUtils-Embed-0:1.35-481.el9_4.1.noarch",
"product": {
"name": "perl-ExtUtils-Embed-0:1.35-481.el9_4.1.noarch",
"product_id": "perl-ExtUtils-Embed-0:1.35-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ExtUtils-Embed@1.35-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-ExtUtils-Miniperl-0:1.09-481.el9_4.1.noarch",
"product": {
"name": "perl-ExtUtils-Miniperl-0:1.09-481.el9_4.1.noarch",
"product_id": "perl-ExtUtils-Miniperl-0:1.09-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ExtUtils-Miniperl@1.09-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-File-Basename-0:2.85-481.el9_4.1.noarch",
"product": {
"name": "perl-File-Basename-0:2.85-481.el9_4.1.noarch",
"product_id": "perl-File-Basename-0:2.85-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-Basename@2.85-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-File-Compare-0:1.100.600-481.el9_4.1.noarch",
"product": {
"name": "perl-File-Compare-0:1.100.600-481.el9_4.1.noarch",
"product_id": "perl-File-Compare-0:1.100.600-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-Compare@1.100.600-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-File-Copy-0:2.34-481.el9_4.1.noarch",
"product": {
"name": "perl-File-Copy-0:2.34-481.el9_4.1.noarch",
"product_id": "perl-File-Copy-0:2.34-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-Copy@2.34-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-File-Find-0:1.37-481.el9_4.1.noarch",
"product": {
"name": "perl-File-Find-0:1.37-481.el9_4.1.noarch",
"product_id": "perl-File-Find-0:1.37-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-Find@1.37-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-File-stat-0:1.09-481.el9_4.1.noarch",
"product": {
"name": "perl-File-stat-0:1.09-481.el9_4.1.noarch",
"product_id": "perl-File-stat-0:1.09-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-stat@1.09-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-FileCache-0:1.10-481.el9_4.1.noarch",
"product": {
"name": "perl-FileCache-0:1.10-481.el9_4.1.noarch",
"product_id": "perl-FileCache-0:1.10-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-FileCache@1.10-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-FileHandle-0:2.03-481.el9_4.1.noarch",
"product": {
"name": "perl-FileHandle-0:2.03-481.el9_4.1.noarch",
"product_id": "perl-FileHandle-0:2.03-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-FileHandle@2.03-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-FindBin-0:1.51-481.el9_4.1.noarch",
"product": {
"name": "perl-FindBin-0:1.51-481.el9_4.1.noarch",
"product_id": "perl-FindBin-0:1.51-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-FindBin@1.51-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Getopt-Std-0:1.12-481.el9_4.1.noarch",
"product": {
"name": "perl-Getopt-Std-0:1.12-481.el9_4.1.noarch",
"product_id": "perl-Getopt-Std-0:1.12-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Getopt-Std@1.12-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Collate-0:1.02-481.el9_4.1.noarch",
"product": {
"name": "perl-I18N-Collate-0:1.02-481.el9_4.1.noarch",
"product_id": "perl-I18N-Collate-0:1.02-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Collate@1.02-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-LangTags-0:0.44-481.el9_4.1.noarch",
"product": {
"name": "perl-I18N-LangTags-0:0.44-481.el9_4.1.noarch",
"product_id": "perl-I18N-LangTags-0:0.44-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-LangTags@0.44-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-IPC-Open3-0:1.21-481.el9_4.1.noarch",
"product": {
"name": "perl-IPC-Open3-0:1.21-481.el9_4.1.noarch",
"product_id": "perl-IPC-Open3-0:1.21-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IPC-Open3@1.21-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Locale-Maketext-Simple-1:0.21-481.el9_4.1.noarch",
"product": {
"name": "perl-Locale-Maketext-Simple-1:0.21-481.el9_4.1.noarch",
"product_id": "perl-Locale-Maketext-Simple-1:0.21-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Locale-Maketext-Simple@0.21-481.el9_4.1?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "perl-Math-Complex-0:1.59-481.el9_4.1.noarch",
"product": {
"name": "perl-Math-Complex-0:1.59-481.el9_4.1.noarch",
"product_id": "perl-Math-Complex-0:1.59-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Math-Complex@1.59-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Memoize-0:1.03-481.el9_4.1.noarch",
"product": {
"name": "perl-Memoize-0:1.03-481.el9_4.1.noarch",
"product_id": "perl-Memoize-0:1.03-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Memoize@1.03-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Module-Loaded-1:0.08-481.el9_4.1.noarch",
"product": {
"name": "perl-Module-Loaded-1:0.08-481.el9_4.1.noarch",
"product_id": "perl-Module-Loaded-1:0.08-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Module-Loaded@0.08-481.el9_4.1?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "perl-NEXT-0:0.67-481.el9_4.1.noarch",
"product": {
"name": "perl-NEXT-0:0.67-481.el9_4.1.noarch",
"product_id": "perl-NEXT-0:0.67-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NEXT@0.67-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Net-0:1.02-481.el9_4.1.noarch",
"product": {
"name": "perl-Net-0:1.02-481.el9_4.1.noarch",
"product_id": "perl-Net-0:1.02-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Net@1.02-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Pod-Functions-0:1.13-481.el9_4.1.noarch",
"product": {
"name": "perl-Pod-Functions-0:1.13-481.el9_4.1.noarch",
"product_id": "perl-Pod-Functions-0:1.13-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Pod-Functions@1.13-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Pod-Html-0:1.25-481.el9_4.1.noarch",
"product": {
"name": "perl-Pod-Html-0:1.25-481.el9_4.1.noarch",
"product_id": "perl-Pod-Html-0:1.25-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Pod-Html@1.25-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Safe-0:2.41-481.el9_4.1.noarch",
"product": {
"name": "perl-Safe-0:2.41-481.el9_4.1.noarch",
"product_id": "perl-Safe-0:2.41-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Safe@2.41-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Search-Dict-0:1.07-481.el9_4.1.noarch",
"product": {
"name": "perl-Search-Dict-0:1.07-481.el9_4.1.noarch",
"product_id": "perl-Search-Dict-0:1.07-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Search-Dict@1.07-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-SelectSaver-0:1.02-481.el9_4.1.noarch",
"product": {
"name": "perl-SelectSaver-0:1.02-481.el9_4.1.noarch",
"product_id": "perl-SelectSaver-0:1.02-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-SelectSaver@1.02-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-SelfLoader-0:1.26-481.el9_4.1.noarch",
"product": {
"name": "perl-SelfLoader-0:1.26-481.el9_4.1.noarch",
"product_id": "perl-SelfLoader-0:1.26-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-SelfLoader@1.26-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Symbol-0:1.08-481.el9_4.1.noarch",
"product": {
"name": "perl-Symbol-0:1.08-481.el9_4.1.noarch",
"product_id": "perl-Symbol-0:1.08-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Symbol@1.08-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Term-Complete-0:1.403-481.el9_4.1.noarch",
"product": {
"name": "perl-Term-Complete-0:1.403-481.el9_4.1.noarch",
"product_id": "perl-Term-Complete-0:1.403-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Term-Complete@1.403-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Term-ReadLine-0:1.17-481.el9_4.1.noarch",
"product": {
"name": "perl-Term-ReadLine-0:1.17-481.el9_4.1.noarch",
"product_id": "perl-Term-ReadLine-0:1.17-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Term-ReadLine@1.17-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Test-0:1.31-481.el9_4.1.noarch",
"product": {
"name": "perl-Test-0:1.31-481.el9_4.1.noarch",
"product_id": "perl-Test-0:1.31-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Test@1.31-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Text-Abbrev-0:1.02-481.el9_4.1.noarch",
"product": {
"name": "perl-Text-Abbrev-0:1.02-481.el9_4.1.noarch",
"product_id": "perl-Text-Abbrev-0:1.02-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Text-Abbrev@1.02-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Thread-0:3.05-481.el9_4.1.noarch",
"product": {
"name": "perl-Thread-0:3.05-481.el9_4.1.noarch",
"product_id": "perl-Thread-0:3.05-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Thread@3.05-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Thread-Semaphore-0:2.13-481.el9_4.1.noarch",
"product": {
"name": "perl-Thread-Semaphore-0:2.13-481.el9_4.1.noarch",
"product_id": "perl-Thread-Semaphore-0:2.13-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Thread-Semaphore@2.13-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Tie-0:4.6-481.el9_4.1.noarch",
"product": {
"name": "perl-Tie-0:4.6-481.el9_4.1.noarch",
"product_id": "perl-Tie-0:4.6-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Tie@4.6-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Tie-File-0:1.06-481.el9_4.1.noarch",
"product": {
"name": "perl-Tie-File-0:1.06-481.el9_4.1.noarch",
"product_id": "perl-Tie-File-0:1.06-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Tie-File@1.06-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Tie-Memoize-0:1.1-481.el9_4.1.noarch",
"product": {
"name": "perl-Tie-Memoize-0:1.1-481.el9_4.1.noarch",
"product_id": "perl-Tie-Memoize-0:1.1-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Tie-Memoize@1.1-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Time-0:1.03-481.el9_4.1.noarch",
"product": {
"name": "perl-Time-0:1.03-481.el9_4.1.noarch",
"product_id": "perl-Time-0:1.03-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time@1.03-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Unicode-UCD-0:0.75-481.el9_4.1.noarch",
"product": {
"name": "perl-Unicode-UCD-0:0.75-481.el9_4.1.noarch",
"product_id": "perl-Unicode-UCD-0:0.75-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Unicode-UCD@0.75-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-User-pwent-0:1.03-481.el9_4.1.noarch",
"product": {
"name": "perl-User-pwent-0:1.03-481.el9_4.1.noarch",
"product_id": "perl-User-pwent-0:1.03-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-User-pwent@1.03-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-autouse-0:1.11-481.el9_4.1.noarch",
"product": {
"name": "perl-autouse-0:1.11-481.el9_4.1.noarch",
"product_id": "perl-autouse-0:1.11-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-autouse@1.11-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-base-0:2.27-481.el9_4.1.noarch",
"product": {
"name": "perl-base-0:2.27-481.el9_4.1.noarch",
"product_id": "perl-base-0:2.27-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-base@2.27-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-blib-0:1.07-481.el9_4.1.noarch",
"product": {
"name": "perl-blib-0:1.07-481.el9_4.1.noarch",
"product_id": "perl-blib-0:1.07-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-blib@1.07-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-debugger-0:1.56-481.el9_4.1.noarch",
"product": {
"name": "perl-debugger-0:1.56-481.el9_4.1.noarch",
"product_id": "perl-debugger-0:1.56-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debugger@1.56-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-deprecate-0:0.04-481.el9_4.1.noarch",
"product": {
"name": "perl-deprecate-0:0.04-481.el9_4.1.noarch",
"product_id": "perl-deprecate-0:0.04-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-deprecate@0.04-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-diagnostics-0:1.37-481.el9_4.1.noarch",
"product": {
"name": "perl-diagnostics-0:1.37-481.el9_4.1.noarch",
"product_id": "perl-diagnostics-0:1.37-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-diagnostics@1.37-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-doc-0:5.32.1-481.el9_4.1.noarch",
"product": {
"name": "perl-doc-0:5.32.1-481.el9_4.1.noarch",
"product_id": "perl-doc-0:5.32.1-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-doc@5.32.1-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-encoding-warnings-0:0.13-481.el9_4.1.noarch",
"product": {
"name": "perl-encoding-warnings-0:0.13-481.el9_4.1.noarch",
"product_id": "perl-encoding-warnings-0:0.13-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-encoding-warnings@0.13-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-fields-0:2.27-481.el9_4.1.noarch",
"product": {
"name": "perl-fields-0:2.27-481.el9_4.1.noarch",
"product_id": "perl-fields-0:2.27-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-fields@2.27-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-filetest-0:1.03-481.el9_4.1.noarch",
"product": {
"name": "perl-filetest-0:1.03-481.el9_4.1.noarch",
"product_id": "perl-filetest-0:1.03-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-filetest@1.03-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-if-0:0.60.800-481.el9_4.1.noarch",
"product": {
"name": "perl-if-0:0.60.800-481.el9_4.1.noarch",
"product_id": "perl-if-0:0.60.800-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-if@0.60.800-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-less-0:0.03-481.el9_4.1.noarch",
"product": {
"name": "perl-less-0:0.03-481.el9_4.1.noarch",
"product_id": "perl-less-0:0.03-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-less@0.03-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-libnetcfg-4:5.32.1-481.el9_4.1.noarch",
"product": {
"name": "perl-libnetcfg-4:5.32.1-481.el9_4.1.noarch",
"product_id": "perl-libnetcfg-4:5.32.1-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libnetcfg@5.32.1-481.el9_4.1?arch=noarch\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-locale-0:1.09-481.el9_4.1.noarch",
"product": {
"name": "perl-locale-0:1.09-481.el9_4.1.noarch",
"product_id": "perl-locale-0:1.09-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-locale@1.09-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-macros-4:5.32.1-481.el9_4.1.noarch",
"product": {
"name": "perl-macros-4:5.32.1-481.el9_4.1.noarch",
"product_id": "perl-macros-4:5.32.1-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-macros@5.32.1-481.el9_4.1?arch=noarch\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-meta-notation-0:5.32.1-481.el9_4.1.noarch",
"product": {
"name": "perl-meta-notation-0:5.32.1-481.el9_4.1.noarch",
"product_id": "perl-meta-notation-0:5.32.1-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-meta-notation@5.32.1-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-open-0:1.12-481.el9_4.1.noarch",
"product": {
"name": "perl-open-0:1.12-481.el9_4.1.noarch",
"product_id": "perl-open-0:1.12-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-open@1.12-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-overload-0:1.31-481.el9_4.1.noarch",
"product": {
"name": "perl-overload-0:1.31-481.el9_4.1.noarch",
"product_id": "perl-overload-0:1.31-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-overload@1.31-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-overloading-0:0.02-481.el9_4.1.noarch",
"product": {
"name": "perl-overloading-0:0.02-481.el9_4.1.noarch",
"product_id": "perl-overloading-0:0.02-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-overloading@0.02-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-sigtrap-0:1.09-481.el9_4.1.noarch",
"product": {
"name": "perl-sigtrap-0:1.09-481.el9_4.1.noarch",
"product_id": "perl-sigtrap-0:1.09-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-sigtrap@1.09-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-sort-0:2.04-481.el9_4.1.noarch",
"product": {
"name": "perl-sort-0:2.04-481.el9_4.1.noarch",
"product_id": "perl-sort-0:2.04-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-sort@2.04-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-subs-0:1.03-481.el9_4.1.noarch",
"product": {
"name": "perl-subs-0:1.03-481.el9_4.1.noarch",
"product_id": "perl-subs-0:1.03-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-subs@1.03-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-utils-0:5.32.1-481.el9_4.1.noarch",
"product": {
"name": "perl-utils-0:5.32.1-481.el9_4.1.noarch",
"product_id": "perl-utils-0:5.32.1-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-utils@5.32.1-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-vars-0:1.05-481.el9_4.1.noarch",
"product": {
"name": "perl-vars-0:1.05-481.el9_4.1.noarch",
"product_id": "perl-vars-0:1.05-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-vars@1.05-481.el9_4.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-vmsish-0:1.04-481.el9_4.1.noarch",
"product": {
"name": "perl-vmsish-0:1.04-481.el9_4.1.noarch",
"product_id": "perl-vmsish-0:1.04-481.el9_4.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-vmsish@1.04-481.el9_4.1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.32.1-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.aarch64"
},
"product_reference": "perl-4:5.32.1-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.32.1-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.ppc64le"
},
"product_reference": "perl-4:5.32.1-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.32.1-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.s390x"
},
"product_reference": "perl-4:5.32.1-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.32.1-481.el9_4.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.src"
},
"product_reference": "perl-4:5.32.1-481.el9_4.1.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.32.1-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.x86_64"
},
"product_reference": "perl-4:5.32.1-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Attribute-Handlers-0:1.01-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Attribute-Handlers-0:1.01-481.el9_4.1.noarch"
},
"product_reference": "perl-Attribute-Handlers-0:1.01-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-AutoLoader-0:5.74-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-AutoLoader-0:5.74-481.el9_4.1.noarch"
},
"product_reference": "perl-AutoLoader-0:5.74-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-AutoSplit-0:5.74-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-AutoSplit-0:5.74-481.el9_4.1.noarch"
},
"product_reference": "perl-AutoSplit-0:5.74-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-0:1.80-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-B-0:1.80-481.el9_4.1.aarch64"
},
"product_reference": "perl-B-0:1.80-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-0:1.80-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-B-0:1.80-481.el9_4.1.ppc64le"
},
"product_reference": "perl-B-0:1.80-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-0:1.80-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-B-0:1.80-481.el9_4.1.s390x"
},
"product_reference": "perl-B-0:1.80-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-0:1.80-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-B-0:1.80-481.el9_4.1.x86_64"
},
"product_reference": "perl-B-0:1.80-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-debuginfo-0:1.80-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.aarch64"
},
"product_reference": "perl-B-debuginfo-0:1.80-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-debuginfo-0:1.80-481.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.i686"
},
"product_reference": "perl-B-debuginfo-0:1.80-481.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-debuginfo-0:1.80-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.ppc64le"
},
"product_reference": "perl-B-debuginfo-0:1.80-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-debuginfo-0:1.80-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.s390x"
},
"product_reference": "perl-B-debuginfo-0:1.80-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-debuginfo-0:1.80-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.x86_64"
},
"product_reference": "perl-B-debuginfo-0:1.80-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Benchmark-0:1.23-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Benchmark-0:1.23-481.el9_4.1.noarch"
},
"product_reference": "perl-Benchmark-0:1.23-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Class-Struct-0:0.66-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Class-Struct-0:0.66-481.el9_4.1.noarch"
},
"product_reference": "perl-Class-Struct-0:0.66-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Config-Extensions-0:0.03-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Config-Extensions-0:0.03-481.el9_4.1.noarch"
},
"product_reference": "perl-Config-Extensions-0:0.03-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-DBM_Filter-0:0.06-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-DBM_Filter-0:0.06-481.el9_4.1.noarch"
},
"product_reference": "perl-DBM_Filter-0:0.06-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-0:1.28-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Devel-Peek-0:1.28-481.el9_4.1.aarch64"
},
"product_reference": "perl-Devel-Peek-0:1.28-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-0:1.28-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Devel-Peek-0:1.28-481.el9_4.1.ppc64le"
},
"product_reference": "perl-Devel-Peek-0:1.28-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-0:1.28-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Devel-Peek-0:1.28-481.el9_4.1.s390x"
},
"product_reference": "perl-Devel-Peek-0:1.28-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-0:1.28-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Devel-Peek-0:1.28-481.el9_4.1.x86_64"
},
"product_reference": "perl-Devel-Peek-0:1.28-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.aarch64"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.i686"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.ppc64le"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.s390x"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.x86_64"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-SelfStubber-0:1.06-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Devel-SelfStubber-0:1.06-481.el9_4.1.noarch"
},
"product_reference": "perl-Devel-SelfStubber-0:1.06-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-DirHandle-0:1.05-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-DirHandle-0:1.05-481.el9_4.1.noarch"
},
"product_reference": "perl-DirHandle-0:1.05-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Dumpvalue-0:2.27-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Dumpvalue-0:2.27-481.el9_4.1.noarch"
},
"product_reference": "perl-Dumpvalue-0:2.27-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-DynaLoader-0:1.47-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-DynaLoader-0:1.47-481.el9_4.1.aarch64"
},
"product_reference": "perl-DynaLoader-0:1.47-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-DynaLoader-0:1.47-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-DynaLoader-0:1.47-481.el9_4.1.ppc64le"
},
"product_reference": "perl-DynaLoader-0:1.47-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-DynaLoader-0:1.47-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-DynaLoader-0:1.47-481.el9_4.1.s390x"
},
"product_reference": "perl-DynaLoader-0:1.47-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-DynaLoader-0:1.47-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-DynaLoader-0:1.47-481.el9_4.1.x86_64"
},
"product_reference": "perl-DynaLoader-0:1.47-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-English-0:1.11-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-English-0:1.11-481.el9_4.1.noarch"
},
"product_reference": "perl-English-0:1.11-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Errno-0:1.30-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Errno-0:1.30-481.el9_4.1.aarch64"
},
"product_reference": "perl-Errno-0:1.30-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Errno-0:1.30-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Errno-0:1.30-481.el9_4.1.ppc64le"
},
"product_reference": "perl-Errno-0:1.30-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Errno-0:1.30-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Errno-0:1.30-481.el9_4.1.s390x"
},
"product_reference": "perl-Errno-0:1.30-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Errno-0:1.30-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Errno-0:1.30-481.el9_4.1.x86_64"
},
"product_reference": "perl-Errno-0:1.30-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ExtUtils-Constant-0:0.25-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-ExtUtils-Constant-0:0.25-481.el9_4.1.noarch"
},
"product_reference": "perl-ExtUtils-Constant-0:0.25-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ExtUtils-Embed-0:1.35-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-ExtUtils-Embed-0:1.35-481.el9_4.1.noarch"
},
"product_reference": "perl-ExtUtils-Embed-0:1.35-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ExtUtils-Miniperl-0:1.09-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-ExtUtils-Miniperl-0:1.09-481.el9_4.1.noarch"
},
"product_reference": "perl-ExtUtils-Miniperl-0:1.09-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-0:1.13-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Fcntl-0:1.13-481.el9_4.1.aarch64"
},
"product_reference": "perl-Fcntl-0:1.13-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-0:1.13-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Fcntl-0:1.13-481.el9_4.1.ppc64le"
},
"product_reference": "perl-Fcntl-0:1.13-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-0:1.13-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Fcntl-0:1.13-481.el9_4.1.s390x"
},
"product_reference": "perl-Fcntl-0:1.13-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-0:1.13-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Fcntl-0:1.13-481.el9_4.1.x86_64"
},
"product_reference": "perl-Fcntl-0:1.13-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.aarch64"
},
"product_reference": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.i686"
},
"product_reference": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.ppc64le"
},
"product_reference": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.s390x"
},
"product_reference": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.x86_64"
},
"product_reference": "perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-Basename-0:2.85-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-File-Basename-0:2.85-481.el9_4.1.noarch"
},
"product_reference": "perl-File-Basename-0:2.85-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-Compare-0:1.100.600-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-File-Compare-0:1.100.600-481.el9_4.1.noarch"
},
"product_reference": "perl-File-Compare-0:1.100.600-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-Copy-0:2.34-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-File-Copy-0:2.34-481.el9_4.1.noarch"
},
"product_reference": "perl-File-Copy-0:2.34-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-0:1.12-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-File-DosGlob-0:1.12-481.el9_4.1.aarch64"
},
"product_reference": "perl-File-DosGlob-0:1.12-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-0:1.12-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-File-DosGlob-0:1.12-481.el9_4.1.ppc64le"
},
"product_reference": "perl-File-DosGlob-0:1.12-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-0:1.12-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-File-DosGlob-0:1.12-481.el9_4.1.s390x"
},
"product_reference": "perl-File-DosGlob-0:1.12-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-0:1.12-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-File-DosGlob-0:1.12-481.el9_4.1.x86_64"
},
"product_reference": "perl-File-DosGlob-0:1.12-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.aarch64"
},
"product_reference": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.i686"
},
"product_reference": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.ppc64le"
},
"product_reference": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.s390x"
},
"product_reference": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.x86_64"
},
"product_reference": "perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-Find-0:1.37-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-File-Find-0:1.37-481.el9_4.1.noarch"
},
"product_reference": "perl-File-Find-0:1.37-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-stat-0:1.09-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-File-stat-0:1.09-481.el9_4.1.noarch"
},
"product_reference": "perl-File-stat-0:1.09-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-FileCache-0:1.10-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-FileCache-0:1.10-481.el9_4.1.noarch"
},
"product_reference": "perl-FileCache-0:1.10-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-FileHandle-0:2.03-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-FileHandle-0:2.03-481.el9_4.1.noarch"
},
"product_reference": "perl-FileHandle-0:2.03-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-FindBin-0:1.51-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-FindBin-0:1.51-481.el9_4.1.noarch"
},
"product_reference": "perl-FindBin-0:1.51-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-0:1.18-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-GDBM_File-0:1.18-481.el9_4.1.aarch64"
},
"product_reference": "perl-GDBM_File-0:1.18-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-0:1.18-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-GDBM_File-0:1.18-481.el9_4.1.ppc64le"
},
"product_reference": "perl-GDBM_File-0:1.18-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-0:1.18-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-GDBM_File-0:1.18-481.el9_4.1.s390x"
},
"product_reference": "perl-GDBM_File-0:1.18-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-0:1.18-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-GDBM_File-0:1.18-481.el9_4.1.x86_64"
},
"product_reference": "perl-GDBM_File-0:1.18-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.aarch64"
},
"product_reference": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.i686"
},
"product_reference": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.ppc64le"
},
"product_reference": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.s390x"
},
"product_reference": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.x86_64"
},
"product_reference": "perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Getopt-Std-0:1.12-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Getopt-Std-0:1.12-481.el9_4.1.noarch"
},
"product_reference": "perl-Getopt-Std-0:1.12-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-0:0.23-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Hash-Util-0:0.23-481.el9_4.1.aarch64"
},
"product_reference": "perl-Hash-Util-0:0.23-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-0:0.23-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Hash-Util-0:0.23-481.el9_4.1.ppc64le"
},
"product_reference": "perl-Hash-Util-0:0.23-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-0:0.23-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Hash-Util-0:0.23-481.el9_4.1.s390x"
},
"product_reference": "perl-Hash-Util-0:0.23-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-0:0.23-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Hash-Util-0:0.23-481.el9_4.1.x86_64"
},
"product_reference": "perl-Hash-Util-0:0.23-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.aarch64"
},
"product_reference": "perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.ppc64le"
},
"product_reference": "perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.s390x"
},
"product_reference": "perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.x86_64"
},
"product_reference": "perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.aarch64"
},
"product_reference": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.i686"
},
"product_reference": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.ppc64le"
},
"product_reference": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.s390x"
},
"product_reference": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.x86_64"
},
"product_reference": "perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.aarch64"
},
"product_reference": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.i686"
},
"product_reference": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.ppc64le"
},
"product_reference": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.s390x"
},
"product_reference": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.x86_64"
},
"product_reference": "perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Collate-0:1.02-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-I18N-Collate-0:1.02-481.el9_4.1.noarch"
},
"product_reference": "perl-I18N-Collate-0:1.02-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-LangTags-0:0.44-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-I18N-LangTags-0:0.44-481.el9_4.1.noarch"
},
"product_reference": "perl-I18N-LangTags-0:0.44-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-0:0.19-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-0:0.19-481.el9_4.1.aarch64"
},
"product_reference": "perl-I18N-Langinfo-0:0.19-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-0:0.19-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-0:0.19-481.el9_4.1.ppc64le"
},
"product_reference": "perl-I18N-Langinfo-0:0.19-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-0:0.19-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-0:0.19-481.el9_4.1.s390x"
},
"product_reference": "perl-I18N-Langinfo-0:0.19-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-0:0.19-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-0:0.19-481.el9_4.1.x86_64"
},
"product_reference": "perl-I18N-Langinfo-0:0.19-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.aarch64"
},
"product_reference": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.i686"
},
"product_reference": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.ppc64le"
},
"product_reference": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.s390x"
},
"product_reference": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.x86_64"
},
"product_reference": "perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-0:1.43-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-IO-0:1.43-481.el9_4.1.aarch64"
},
"product_reference": "perl-IO-0:1.43-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-0:1.43-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-IO-0:1.43-481.el9_4.1.ppc64le"
},
"product_reference": "perl-IO-0:1.43-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-0:1.43-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-IO-0:1.43-481.el9_4.1.s390x"
},
"product_reference": "perl-IO-0:1.43-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-0:1.43-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-IO-0:1.43-481.el9_4.1.x86_64"
},
"product_reference": "perl-IO-0:1.43-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.43-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.aarch64"
},
"product_reference": "perl-IO-debuginfo-0:1.43-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.43-481.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.i686"
},
"product_reference": "perl-IO-debuginfo-0:1.43-481.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.43-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.ppc64le"
},
"product_reference": "perl-IO-debuginfo-0:1.43-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.43-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.s390x"
},
"product_reference": "perl-IO-debuginfo-0:1.43-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.43-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.x86_64"
},
"product_reference": "perl-IO-debuginfo-0:1.43-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IPC-Open3-0:1.21-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-IPC-Open3-0:1.21-481.el9_4.1.noarch"
},
"product_reference": "perl-IPC-Open3-0:1.21-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Locale-Maketext-Simple-1:0.21-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Locale-Maketext-Simple-1:0.21-481.el9_4.1.noarch"
},
"product_reference": "perl-Locale-Maketext-Simple-1:0.21-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Math-Complex-0:1.59-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Math-Complex-0:1.59-481.el9_4.1.noarch"
},
"product_reference": "perl-Math-Complex-0:1.59-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Memoize-0:1.03-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Memoize-0:1.03-481.el9_4.1.noarch"
},
"product_reference": "perl-Memoize-0:1.03-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Module-Loaded-1:0.08-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Module-Loaded-1:0.08-481.el9_4.1.noarch"
},
"product_reference": "perl-Module-Loaded-1:0.08-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-0:1.15-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-NDBM_File-0:1.15-481.el9_4.1.aarch64"
},
"product_reference": "perl-NDBM_File-0:1.15-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-0:1.15-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-NDBM_File-0:1.15-481.el9_4.1.ppc64le"
},
"product_reference": "perl-NDBM_File-0:1.15-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-0:1.15-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-NDBM_File-0:1.15-481.el9_4.1.s390x"
},
"product_reference": "perl-NDBM_File-0:1.15-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-0:1.15-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-NDBM_File-0:1.15-481.el9_4.1.x86_64"
},
"product_reference": "perl-NDBM_File-0:1.15-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.aarch64"
},
"product_reference": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.i686"
},
"product_reference": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.ppc64le"
},
"product_reference": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.s390x"
},
"product_reference": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.x86_64"
},
"product_reference": "perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NEXT-0:0.67-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-NEXT-0:0.67-481.el9_4.1.noarch"
},
"product_reference": "perl-NEXT-0:0.67-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Net-0:1.02-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Net-0:1.02-481.el9_4.1.noarch"
},
"product_reference": "perl-Net-0:1.02-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-0:1.16-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-ODBM_File-0:1.16-481.el9_4.1.aarch64"
},
"product_reference": "perl-ODBM_File-0:1.16-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-0:1.16-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-ODBM_File-0:1.16-481.el9_4.1.ppc64le"
},
"product_reference": "perl-ODBM_File-0:1.16-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-0:1.16-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-ODBM_File-0:1.16-481.el9_4.1.s390x"
},
"product_reference": "perl-ODBM_File-0:1.16-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-0:1.16-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-ODBM_File-0:1.16-481.el9_4.1.x86_64"
},
"product_reference": "perl-ODBM_File-0:1.16-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.aarch64"
},
"product_reference": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.i686"
},
"product_reference": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.ppc64le"
},
"product_reference": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.s390x"
},
"product_reference": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.x86_64"
},
"product_reference": "perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-0:1.48-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Opcode-0:1.48-481.el9_4.1.aarch64"
},
"product_reference": "perl-Opcode-0:1.48-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-0:1.48-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Opcode-0:1.48-481.el9_4.1.ppc64le"
},
"product_reference": "perl-Opcode-0:1.48-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-0:1.48-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Opcode-0:1.48-481.el9_4.1.s390x"
},
"product_reference": "perl-Opcode-0:1.48-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-0:1.48-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Opcode-0:1.48-481.el9_4.1.x86_64"
},
"product_reference": "perl-Opcode-0:1.48-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.aarch64"
},
"product_reference": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.i686"
},
"product_reference": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.ppc64le"
},
"product_reference": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.s390x"
},
"product_reference": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.x86_64"
},
"product_reference": "perl-Opcode-debuginfo-0:1.48-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-0:1.94-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-POSIX-0:1.94-481.el9_4.1.aarch64"
},
"product_reference": "perl-POSIX-0:1.94-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-0:1.94-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-POSIX-0:1.94-481.el9_4.1.ppc64le"
},
"product_reference": "perl-POSIX-0:1.94-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-0:1.94-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-POSIX-0:1.94-481.el9_4.1.s390x"
},
"product_reference": "perl-POSIX-0:1.94-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-0:1.94-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-POSIX-0:1.94-481.el9_4.1.x86_64"
},
"product_reference": "perl-POSIX-0:1.94-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.aarch64"
},
"product_reference": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.i686"
},
"product_reference": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.ppc64le"
},
"product_reference": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.s390x"
},
"product_reference": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.x86_64"
},
"product_reference": "perl-POSIX-debuginfo-0:1.94-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Pod-Functions-0:1.13-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Pod-Functions-0:1.13-481.el9_4.1.noarch"
},
"product_reference": "perl-Pod-Functions-0:1.13-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Pod-Html-0:1.25-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Pod-Html-0:1.25-481.el9_4.1.noarch"
},
"product_reference": "perl-Pod-Html-0:1.25-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Safe-0:2.41-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Safe-0:2.41-481.el9_4.1.noarch"
},
"product_reference": "perl-Safe-0:2.41-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Search-Dict-0:1.07-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Search-Dict-0:1.07-481.el9_4.1.noarch"
},
"product_reference": "perl-Search-Dict-0:1.07-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SelectSaver-0:1.02-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-SelectSaver-0:1.02-481.el9_4.1.noarch"
},
"product_reference": "perl-SelectSaver-0:1.02-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SelfLoader-0:1.26-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-SelfLoader-0:1.26-481.el9_4.1.noarch"
},
"product_reference": "perl-SelfLoader-0:1.26-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Symbol-0:1.08-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Symbol-0:1.08-481.el9_4.1.noarch"
},
"product_reference": "perl-Symbol-0:1.08-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-0:1.23-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-0:1.23-481.el9_4.1.aarch64"
},
"product_reference": "perl-Sys-Hostname-0:1.23-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-0:1.23-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-0:1.23-481.el9_4.1.ppc64le"
},
"product_reference": "perl-Sys-Hostname-0:1.23-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-0:1.23-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-0:1.23-481.el9_4.1.s390x"
},
"product_reference": "perl-Sys-Hostname-0:1.23-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-0:1.23-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-0:1.23-481.el9_4.1.x86_64"
},
"product_reference": "perl-Sys-Hostname-0:1.23-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.aarch64"
},
"product_reference": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.i686"
},
"product_reference": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.ppc64le"
},
"product_reference": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.s390x"
},
"product_reference": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.x86_64"
},
"product_reference": "perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Term-Complete-0:1.403-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Term-Complete-0:1.403-481.el9_4.1.noarch"
},
"product_reference": "perl-Term-Complete-0:1.403-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Term-ReadLine-0:1.17-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Term-ReadLine-0:1.17-481.el9_4.1.noarch"
},
"product_reference": "perl-Term-ReadLine-0:1.17-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Test-0:1.31-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Test-0:1.31-481.el9_4.1.noarch"
},
"product_reference": "perl-Test-0:1.31-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Text-Abbrev-0:1.02-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Text-Abbrev-0:1.02-481.el9_4.1.noarch"
},
"product_reference": "perl-Text-Abbrev-0:1.02-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Thread-0:3.05-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Thread-0:3.05-481.el9_4.1.noarch"
},
"product_reference": "perl-Thread-0:3.05-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Thread-Semaphore-0:2.13-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Thread-Semaphore-0:2.13-481.el9_4.1.noarch"
},
"product_reference": "perl-Thread-Semaphore-0:2.13-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Tie-0:4.6-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Tie-0:4.6-481.el9_4.1.noarch"
},
"product_reference": "perl-Tie-0:4.6-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Tie-File-0:1.06-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Tie-File-0:1.06-481.el9_4.1.noarch"
},
"product_reference": "perl-Tie-File-0:1.06-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Tie-Memoize-0:1.1-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Tie-Memoize-0:1.1-481.el9_4.1.noarch"
},
"product_reference": "perl-Tie-Memoize-0:1.1-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-0:1.03-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Time-0:1.03-481.el9_4.1.noarch"
},
"product_reference": "perl-Time-0:1.03-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-0:1.3401-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Time-Piece-0:1.3401-481.el9_4.1.aarch64"
},
"product_reference": "perl-Time-Piece-0:1.3401-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-0:1.3401-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Time-Piece-0:1.3401-481.el9_4.1.ppc64le"
},
"product_reference": "perl-Time-Piece-0:1.3401-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-0:1.3401-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Time-Piece-0:1.3401-481.el9_4.1.s390x"
},
"product_reference": "perl-Time-Piece-0:1.3401-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-0:1.3401-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Time-Piece-0:1.3401-481.el9_4.1.x86_64"
},
"product_reference": "perl-Time-Piece-0:1.3401-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.aarch64"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.i686"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.ppc64le"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.s390x"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.x86_64"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Unicode-UCD-0:0.75-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-Unicode-UCD-0:0.75-481.el9_4.1.noarch"
},
"product_reference": "perl-Unicode-UCD-0:0.75-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-User-pwent-0:1.03-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-User-pwent-0:1.03-481.el9_4.1.noarch"
},
"product_reference": "perl-User-pwent-0:1.03-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-autouse-0:1.11-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-autouse-0:1.11-481.el9_4.1.noarch"
},
"product_reference": "perl-autouse-0:1.11-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-0:2.27-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-base-0:2.27-481.el9_4.1.noarch"
},
"product_reference": "perl-base-0:2.27-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-blib-0:1.07-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-blib-0:1.07-481.el9_4.1.noarch"
},
"product_reference": "perl-blib-0:1.07-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugger-0:1.56-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-debugger-0:1.56-481.el9_4.1.noarch"
},
"product_reference": "perl-debugger-0:1.56-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.32.1-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.aarch64"
},
"product_reference": "perl-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.32.1-481.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.i686"
},
"product_reference": "perl-debuginfo-4:5.32.1-481.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.32.1-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.ppc64le"
},
"product_reference": "perl-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.32.1-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.s390x"
},
"product_reference": "perl-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.32.1-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.x86_64"
},
"product_reference": "perl-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.32.1-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.aarch64"
},
"product_reference": "perl-debugsource-4:5.32.1-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.32.1-481.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.i686"
},
"product_reference": "perl-debugsource-4:5.32.1-481.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.32.1-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.ppc64le"
},
"product_reference": "perl-debugsource-4:5.32.1-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.32.1-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.s390x"
},
"product_reference": "perl-debugsource-4:5.32.1-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.32.1-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.x86_64"
},
"product_reference": "perl-debugsource-4:5.32.1-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-deprecate-0:0.04-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-deprecate-0:0.04-481.el9_4.1.noarch"
},
"product_reference": "perl-deprecate-0:0.04-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.32.1-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.aarch64"
},
"product_reference": "perl-devel-4:5.32.1-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.32.1-481.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.i686"
},
"product_reference": "perl-devel-4:5.32.1-481.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.32.1-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.ppc64le"
},
"product_reference": "perl-devel-4:5.32.1-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.32.1-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.s390x"
},
"product_reference": "perl-devel-4:5.32.1-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.32.1-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.x86_64"
},
"product_reference": "perl-devel-4:5.32.1-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-diagnostics-0:1.37-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-diagnostics-0:1.37-481.el9_4.1.noarch"
},
"product_reference": "perl-diagnostics-0:1.37-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-doc-0:5.32.1-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-doc-0:5.32.1-481.el9_4.1.noarch"
},
"product_reference": "perl-doc-0:5.32.1-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-encoding-warnings-0:0.13-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-encoding-warnings-0:0.13-481.el9_4.1.noarch"
},
"product_reference": "perl-encoding-warnings-0:0.13-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-fields-0:2.27-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-fields-0:2.27-481.el9_4.1.noarch"
},
"product_reference": "perl-fields-0:2.27-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-filetest-0:1.03-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-filetest-0:1.03-481.el9_4.1.noarch"
},
"product_reference": "perl-filetest-0:1.03-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-if-0:0.60.800-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-if-0:0.60.800-481.el9_4.1.noarch"
},
"product_reference": "perl-if-0:0.60.800-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-4:5.32.1-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-interpreter-4:5.32.1-481.el9_4.1.aarch64"
},
"product_reference": "perl-interpreter-4:5.32.1-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-4:5.32.1-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-interpreter-4:5.32.1-481.el9_4.1.ppc64le"
},
"product_reference": "perl-interpreter-4:5.32.1-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-4:5.32.1-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-interpreter-4:5.32.1-481.el9_4.1.s390x"
},
"product_reference": "perl-interpreter-4:5.32.1-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-4:5.32.1-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-interpreter-4:5.32.1-481.el9_4.1.x86_64"
},
"product_reference": "perl-interpreter-4:5.32.1-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.aarch64"
},
"product_reference": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.i686"
},
"product_reference": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.ppc64le"
},
"product_reference": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.s390x"
},
"product_reference": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.x86_64"
},
"product_reference": "perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-less-0:0.03-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-less-0:0.03-481.el9_4.1.noarch"
},
"product_reference": "perl-less-0:0.03-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-lib-0:0.65-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-lib-0:0.65-481.el9_4.1.aarch64"
},
"product_reference": "perl-lib-0:0.65-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-lib-0:0.65-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-lib-0:0.65-481.el9_4.1.ppc64le"
},
"product_reference": "perl-lib-0:0.65-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-lib-0:0.65-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-lib-0:0.65-481.el9_4.1.s390x"
},
"product_reference": "perl-lib-0:0.65-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-lib-0:0.65-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-lib-0:0.65-481.el9_4.1.x86_64"
},
"product_reference": "perl-lib-0:0.65-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libnetcfg-4:5.32.1-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-libnetcfg-4:5.32.1-481.el9_4.1.noarch"
},
"product_reference": "perl-libnetcfg-4:5.32.1-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.32.1-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.aarch64"
},
"product_reference": "perl-libs-4:5.32.1-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.32.1-481.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.i686"
},
"product_reference": "perl-libs-4:5.32.1-481.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.32.1-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.ppc64le"
},
"product_reference": "perl-libs-4:5.32.1-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.32.1-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.s390x"
},
"product_reference": "perl-libs-4:5.32.1-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.32.1-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.x86_64"
},
"product_reference": "perl-libs-4:5.32.1-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.aarch64"
},
"product_reference": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.i686"
},
"product_reference": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.ppc64le"
},
"product_reference": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.s390x"
},
"product_reference": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.x86_64"
},
"product_reference": "perl-libs-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-locale-0:1.09-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-locale-0:1.09-481.el9_4.1.noarch"
},
"product_reference": "perl-locale-0:1.09-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-macros-4:5.32.1-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-macros-4:5.32.1-481.el9_4.1.noarch"
},
"product_reference": "perl-macros-4:5.32.1-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-meta-notation-0:5.32.1-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-meta-notation-0:5.32.1-481.el9_4.1.noarch"
},
"product_reference": "perl-meta-notation-0:5.32.1-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-0:1.23-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-mro-0:1.23-481.el9_4.1.aarch64"
},
"product_reference": "perl-mro-0:1.23-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-0:1.23-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-mro-0:1.23-481.el9_4.1.ppc64le"
},
"product_reference": "perl-mro-0:1.23-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-0:1.23-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-mro-0:1.23-481.el9_4.1.s390x"
},
"product_reference": "perl-mro-0:1.23-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-0:1.23-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-mro-0:1.23-481.el9_4.1.x86_64"
},
"product_reference": "perl-mro-0:1.23-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-debuginfo-0:1.23-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.aarch64"
},
"product_reference": "perl-mro-debuginfo-0:1.23-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-debuginfo-0:1.23-481.el9_4.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.i686"
},
"product_reference": "perl-mro-debuginfo-0:1.23-481.el9_4.1.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-debuginfo-0:1.23-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.ppc64le"
},
"product_reference": "perl-mro-debuginfo-0:1.23-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-debuginfo-0:1.23-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.s390x"
},
"product_reference": "perl-mro-debuginfo-0:1.23-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-debuginfo-0:1.23-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.x86_64"
},
"product_reference": "perl-mro-debuginfo-0:1.23-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-open-0:1.12-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-open-0:1.12-481.el9_4.1.noarch"
},
"product_reference": "perl-open-0:1.12-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-overload-0:1.31-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-overload-0:1.31-481.el9_4.1.noarch"
},
"product_reference": "perl-overload-0:1.31-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-overloading-0:0.02-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-overloading-0:0.02-481.el9_4.1.noarch"
},
"product_reference": "perl-overloading-0:0.02-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ph-0:5.32.1-481.el9_4.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-ph-0:5.32.1-481.el9_4.1.aarch64"
},
"product_reference": "perl-ph-0:5.32.1-481.el9_4.1.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ph-0:5.32.1-481.el9_4.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-ph-0:5.32.1-481.el9_4.1.ppc64le"
},
"product_reference": "perl-ph-0:5.32.1-481.el9_4.1.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ph-0:5.32.1-481.el9_4.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-ph-0:5.32.1-481.el9_4.1.s390x"
},
"product_reference": "perl-ph-0:5.32.1-481.el9_4.1.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ph-0:5.32.1-481.el9_4.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-ph-0:5.32.1-481.el9_4.1.x86_64"
},
"product_reference": "perl-ph-0:5.32.1-481.el9_4.1.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-sigtrap-0:1.09-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-sigtrap-0:1.09-481.el9_4.1.noarch"
},
"product_reference": "perl-sigtrap-0:1.09-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-sort-0:2.04-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-sort-0:2.04-481.el9_4.1.noarch"
},
"product_reference": "perl-sort-0:2.04-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-subs-0:1.03-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-subs-0:1.03-481.el9_4.1.noarch"
},
"product_reference": "perl-subs-0:1.03-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-utils-0:5.32.1-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-utils-0:5.32.1-481.el9_4.1.noarch"
},
"product_reference": "perl-utils-0:5.32.1-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-vars-0:1.05-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-vars-0:1.05-481.el9_4.1.noarch"
},
"product_reference": "perl-vars-0:1.05-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-vmsish-0:1.04-481.el9_4.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:perl-vmsish-0:1.04-481.el9_4.1.noarch"
},
"product_reference": "perl-vmsish-0:1.04-481.el9_4.1.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-40909",
"cwe": {
"id": "CWE-426",
"name": "Untrusted Search Path"
},
"discovery_date": "2025-05-30T13:00:49.546076+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2369407"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "perl: Perl threads have a working directory race condition where file operations may target unintended paths",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to the successful exploitation of a CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027) or CWE-426: Untrusted Search Path vulnerability, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces least functionality by enabling only essential features, services, and ports to reduce the system\u2019s attack surface. Static code analysis, peer reviews, and robust input validation and error handling detect unsafe input that could affect execution timing or path resolution. Real-time threat detection, including IPS/IDS, antimalware, and continuous system monitoring, enables rapid identification of exploitation attempts. Process isolation reduces the likelihood of concurrent execution conflicts and contains any impact to isolated workloads. Executable search paths are restricted to trusted, explicitly defined directories, mitigating the risk of executing malicious files. These controls effectively lower the likelihood and impact of race conditions and untrusted path exploitation in the environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Attribute-Handlers-0:1.01-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-AutoLoader-0:5.74-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-AutoSplit-0:5.74-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-B-0:1.80-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-B-0:1.80-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-B-0:1.80-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-B-0:1.80-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Benchmark-0:1.23-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Class-Struct-0:0.66-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Config-Extensions-0:0.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-DBM_Filter-0:0.06-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-0:1.28-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-0:1.28-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-0:1.28-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-0:1.28-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Devel-SelfStubber-0:1.06-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-DirHandle-0:1.05-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Dumpvalue-0:2.27-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-DynaLoader-0:1.47-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-DynaLoader-0:1.47-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-DynaLoader-0:1.47-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-DynaLoader-0:1.47-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-English-0:1.11-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Errno-0:1.30-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Errno-0:1.30-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Errno-0:1.30-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Errno-0:1.30-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-ExtUtils-Constant-0:0.25-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-ExtUtils-Embed-0:1.35-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-ExtUtils-Miniperl-0:1.09-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-0:1.13-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-0:1.13-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-0:1.13-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-0:1.13-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-File-Basename-0:2.85-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-File-Compare-0:1.100.600-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-File-Copy-0:2.34-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-0:1.12-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-0:1.12-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-0:1.12-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-0:1.12-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-File-Find-0:1.37-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-File-stat-0:1.09-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-FileCache-0:1.10-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-FileHandle-0:2.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-FindBin-0:1.51-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-0:1.18-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-0:1.18-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-0:1.18-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-0:1.18-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Getopt-Std-0:1.12-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-0:0.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-0:0.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-0:0.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-0:0.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-I18N-Collate-0:1.02-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-I18N-LangTags-0:0.44-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-0:0.19-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-0:0.19-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-0:0.19-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-0:0.19-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-IO-0:1.43-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-IO-0:1.43-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-IO-0:1.43-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-IO-0:1.43-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-IPC-Open3-0:1.21-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Locale-Maketext-Simple-1:0.21-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Math-Complex-0:1.59-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Memoize-0:1.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Module-Loaded-1:0.08-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-0:1.15-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-0:1.15-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-0:1.15-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-0:1.15-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-NEXT-0:0.67-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Net-0:1.02-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-0:1.16-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-0:1.16-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-0:1.16-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-0:1.16-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Opcode-0:1.48-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Opcode-0:1.48-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Opcode-0:1.48-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Opcode-0:1.48-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-POSIX-0:1.94-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-POSIX-0:1.94-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-POSIX-0:1.94-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-POSIX-0:1.94-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Pod-Functions-0:1.13-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Pod-Html-0:1.25-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Safe-0:2.41-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Search-Dict-0:1.07-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-SelectSaver-0:1.02-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-SelfLoader-0:1.26-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Symbol-0:1.08-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-0:1.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-0:1.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-0:1.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-0:1.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Term-Complete-0:1.403-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Term-ReadLine-0:1.17-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Test-0:1.31-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Text-Abbrev-0:1.02-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Thread-0:3.05-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Thread-Semaphore-0:2.13-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Tie-0:4.6-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Tie-File-0:1.06-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Tie-Memoize-0:1.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Time-0:1.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-0:1.3401-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-0:1.3401-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-0:1.3401-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-0:1.3401-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Unicode-UCD-0:0.75-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-User-pwent-0:1.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-autouse-0:1.11-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-base-0:2.27-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-blib-0:1.07-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-debugger-0:1.56-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-deprecate-0:0.04-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-diagnostics-0:1.37-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-doc-0:5.32.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-encoding-warnings-0:0.13-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-fields-0:2.27-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-filetest-0:1.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-if-0:0.60.800-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-interpreter-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-interpreter-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-interpreter-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-interpreter-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-less-0:0.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-lib-0:0.65-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-lib-0:0.65-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-lib-0:0.65-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-lib-0:0.65-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-libnetcfg-4:5.32.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-locale-0:1.09-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-macros-4:5.32.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-meta-notation-0:5.32.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-mro-0:1.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-mro-0:1.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-mro-0:1.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-mro-0:1.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-open-0:1.12-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-overload-0:1.31-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-overloading-0:0.02-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-ph-0:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-ph-0:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-ph-0:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-ph-0:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-sigtrap-0:1.09-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-sort-0:2.04-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-subs-0:1.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-utils-0:5.32.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-vars-0:1.05-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-vmsish-0:1.04-481.el9_4.1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-40909"
},
{
"category": "external",
"summary": "RHBZ#2369407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369407"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-40909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40909"
},
{
"category": "external",
"summary": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226"
},
{
"category": "external",
"summary": "https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e",
"url": "https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e"
},
{
"category": "external",
"summary": "https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch",
"url": "https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch"
},
{
"category": "external",
"summary": "https://github.com/Perl/perl5/issues/10387",
"url": "https://github.com/Perl/perl5/issues/10387"
},
{
"category": "external",
"summary": "https://github.com/Perl/perl5/issues/23010",
"url": "https://github.com/Perl/perl5/issues/23010"
},
{
"category": "external",
"summary": "https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads",
"url": "https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/05/22/2",
"url": "https://www.openwall.com/lists/oss-security/2025/05/22/2"
}
],
"release_date": "2025-05-30T12:20:11.237000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-22T18:22:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Attribute-Handlers-0:1.01-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-AutoLoader-0:5.74-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-AutoSplit-0:5.74-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-B-0:1.80-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-B-0:1.80-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-B-0:1.80-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-B-0:1.80-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Benchmark-0:1.23-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Class-Struct-0:0.66-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Config-Extensions-0:0.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-DBM_Filter-0:0.06-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-0:1.28-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-0:1.28-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-0:1.28-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-0:1.28-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Devel-SelfStubber-0:1.06-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-DirHandle-0:1.05-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Dumpvalue-0:2.27-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-DynaLoader-0:1.47-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-DynaLoader-0:1.47-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-DynaLoader-0:1.47-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-DynaLoader-0:1.47-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-English-0:1.11-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Errno-0:1.30-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Errno-0:1.30-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Errno-0:1.30-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Errno-0:1.30-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-ExtUtils-Constant-0:0.25-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-ExtUtils-Embed-0:1.35-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-ExtUtils-Miniperl-0:1.09-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-0:1.13-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-0:1.13-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-0:1.13-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-0:1.13-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-File-Basename-0:2.85-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-File-Compare-0:1.100.600-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-File-Copy-0:2.34-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-0:1.12-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-0:1.12-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-0:1.12-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-0:1.12-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-File-Find-0:1.37-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-File-stat-0:1.09-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-FileCache-0:1.10-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-FileHandle-0:2.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-FindBin-0:1.51-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-0:1.18-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-0:1.18-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-0:1.18-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-0:1.18-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Getopt-Std-0:1.12-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-0:0.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-0:0.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-0:0.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-0:0.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-I18N-Collate-0:1.02-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-I18N-LangTags-0:0.44-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-0:0.19-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-0:0.19-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-0:0.19-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-0:0.19-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-IO-0:1.43-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-IO-0:1.43-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-IO-0:1.43-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-IO-0:1.43-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-IPC-Open3-0:1.21-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Locale-Maketext-Simple-1:0.21-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Math-Complex-0:1.59-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Memoize-0:1.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Module-Loaded-1:0.08-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-0:1.15-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-0:1.15-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-0:1.15-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-0:1.15-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-NEXT-0:0.67-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Net-0:1.02-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-0:1.16-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-0:1.16-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-0:1.16-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-0:1.16-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Opcode-0:1.48-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Opcode-0:1.48-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Opcode-0:1.48-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Opcode-0:1.48-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-POSIX-0:1.94-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-POSIX-0:1.94-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-POSIX-0:1.94-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-POSIX-0:1.94-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Pod-Functions-0:1.13-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Pod-Html-0:1.25-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Safe-0:2.41-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Search-Dict-0:1.07-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-SelectSaver-0:1.02-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-SelfLoader-0:1.26-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Symbol-0:1.08-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-0:1.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-0:1.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-0:1.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-0:1.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Term-Complete-0:1.403-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Term-ReadLine-0:1.17-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Test-0:1.31-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Text-Abbrev-0:1.02-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Thread-0:3.05-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Thread-Semaphore-0:2.13-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Tie-0:4.6-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Tie-File-0:1.06-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Tie-Memoize-0:1.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Time-0:1.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-0:1.3401-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-0:1.3401-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-0:1.3401-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-0:1.3401-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Unicode-UCD-0:0.75-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-User-pwent-0:1.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-autouse-0:1.11-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-base-0:2.27-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-blib-0:1.07-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-debugger-0:1.56-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-deprecate-0:0.04-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-diagnostics-0:1.37-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-doc-0:5.32.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-encoding-warnings-0:0.13-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-fields-0:2.27-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-filetest-0:1.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-if-0:0.60.800-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-interpreter-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-interpreter-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-interpreter-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-interpreter-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-less-0:0.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-lib-0:0.65-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-lib-0:0.65-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-lib-0:0.65-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-lib-0:0.65-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-libnetcfg-4:5.32.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-locale-0:1.09-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-macros-4:5.32.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-meta-notation-0:5.32.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-mro-0:1.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-mro-0:1.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-mro-0:1.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-mro-0:1.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-open-0:1.12-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-overload-0:1.31-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-overloading-0:0.02-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-ph-0:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-ph-0:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-ph-0:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-ph-0:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-sigtrap-0:1.09-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-sort-0:2.04-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-subs-0:1.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-utils-0:5.32.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-vars-0:1.05-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-vmsish-0:1.04-481.el9_4.1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:11545"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Attribute-Handlers-0:1.01-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-AutoLoader-0:5.74-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-AutoSplit-0:5.74-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-B-0:1.80-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-B-0:1.80-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-B-0:1.80-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-B-0:1.80-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Benchmark-0:1.23-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Class-Struct-0:0.66-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Config-Extensions-0:0.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-DBM_Filter-0:0.06-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-0:1.28-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-0:1.28-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-0:1.28-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-0:1.28-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Devel-SelfStubber-0:1.06-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-DirHandle-0:1.05-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Dumpvalue-0:2.27-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-DynaLoader-0:1.47-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-DynaLoader-0:1.47-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-DynaLoader-0:1.47-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-DynaLoader-0:1.47-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-English-0:1.11-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Errno-0:1.30-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Errno-0:1.30-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Errno-0:1.30-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Errno-0:1.30-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-ExtUtils-Constant-0:0.25-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-ExtUtils-Embed-0:1.35-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-ExtUtils-Miniperl-0:1.09-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-0:1.13-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-0:1.13-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-0:1.13-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-0:1.13-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-File-Basename-0:2.85-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-File-Compare-0:1.100.600-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-File-Copy-0:2.34-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-0:1.12-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-0:1.12-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-0:1.12-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-0:1.12-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-File-Find-0:1.37-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-File-stat-0:1.09-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-FileCache-0:1.10-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-FileHandle-0:2.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-FindBin-0:1.51-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-0:1.18-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-0:1.18-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-0:1.18-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-0:1.18-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Getopt-Std-0:1.12-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-0:0.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-0:0.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-0:0.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-0:0.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-I18N-Collate-0:1.02-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-I18N-LangTags-0:0.44-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-0:0.19-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-0:0.19-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-0:0.19-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-0:0.19-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-IO-0:1.43-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-IO-0:1.43-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-IO-0:1.43-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-IO-0:1.43-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-IPC-Open3-0:1.21-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Locale-Maketext-Simple-1:0.21-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Math-Complex-0:1.59-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Memoize-0:1.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Module-Loaded-1:0.08-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-0:1.15-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-0:1.15-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-0:1.15-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-0:1.15-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-NEXT-0:0.67-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Net-0:1.02-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-0:1.16-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-0:1.16-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-0:1.16-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-0:1.16-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Opcode-0:1.48-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Opcode-0:1.48-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Opcode-0:1.48-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Opcode-0:1.48-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-POSIX-0:1.94-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-POSIX-0:1.94-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-POSIX-0:1.94-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-POSIX-0:1.94-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Pod-Functions-0:1.13-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Pod-Html-0:1.25-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Safe-0:2.41-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Search-Dict-0:1.07-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-SelectSaver-0:1.02-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-SelfLoader-0:1.26-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Symbol-0:1.08-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-0:1.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-0:1.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-0:1.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-0:1.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Term-Complete-0:1.403-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Term-ReadLine-0:1.17-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Test-0:1.31-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Text-Abbrev-0:1.02-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Thread-0:3.05-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Thread-Semaphore-0:2.13-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Tie-0:4.6-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Tie-File-0:1.06-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Tie-Memoize-0:1.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Time-0:1.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-0:1.3401-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-0:1.3401-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-0:1.3401-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-0:1.3401-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Unicode-UCD-0:0.75-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-User-pwent-0:1.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-autouse-0:1.11-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-base-0:2.27-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-blib-0:1.07-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-debugger-0:1.56-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-deprecate-0:0.04-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-diagnostics-0:1.37-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-doc-0:5.32.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-encoding-warnings-0:0.13-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-fields-0:2.27-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-filetest-0:1.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-if-0:0.60.800-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-interpreter-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-interpreter-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-interpreter-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-interpreter-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-less-0:0.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-lib-0:0.65-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-lib-0:0.65-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-lib-0:0.65-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-lib-0:0.65-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-libnetcfg-4:5.32.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-locale-0:1.09-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-macros-4:5.32.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-meta-notation-0:5.32.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-mro-0:1.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-mro-0:1.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-mro-0:1.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-mro-0:1.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-open-0:1.12-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-overload-0:1.31-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-overloading-0:0.02-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-ph-0:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-ph-0:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-ph-0:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-ph-0:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-sigtrap-0:1.09-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-sort-0:2.04-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-subs-0:1.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-utils-0:5.32.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-vars-0:1.05-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-vmsish-0:1.04-481.el9_4.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.src",
"AppStream-9.4.0.Z.EUS:perl-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Attribute-Handlers-0:1.01-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-AutoLoader-0:5.74-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-AutoSplit-0:5.74-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-B-0:1.80-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-B-0:1.80-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-B-0:1.80-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-B-0:1.80-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-B-debuginfo-0:1.80-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Benchmark-0:1.23-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Class-Struct-0:0.66-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Config-Extensions-0:0.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-DBM_Filter-0:0.06-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-0:1.28-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-0:1.28-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-0:1.28-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-0:1.28-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Devel-Peek-debuginfo-0:1.28-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Devel-SelfStubber-0:1.06-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-DirHandle-0:1.05-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Dumpvalue-0:2.27-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-DynaLoader-0:1.47-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-DynaLoader-0:1.47-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-DynaLoader-0:1.47-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-DynaLoader-0:1.47-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-English-0:1.11-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Errno-0:1.30-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Errno-0:1.30-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Errno-0:1.30-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Errno-0:1.30-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-ExtUtils-Constant-0:0.25-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-ExtUtils-Embed-0:1.35-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-ExtUtils-Miniperl-0:1.09-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-0:1.13-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-0:1.13-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-0:1.13-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-0:1.13-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Fcntl-debuginfo-0:1.13-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-File-Basename-0:2.85-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-File-Compare-0:1.100.600-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-File-Copy-0:2.34-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-0:1.12-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-0:1.12-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-0:1.12-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-0:1.12-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-File-DosGlob-debuginfo-0:1.12-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-File-Find-0:1.37-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-File-stat-0:1.09-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-FileCache-0:1.10-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-FileHandle-0:2.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-FindBin-0:1.51-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-0:1.18-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-0:1.18-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-0:1.18-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-0:1.18-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-GDBM_File-debuginfo-0:1.18-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Getopt-Std-0:1.12-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-0:0.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-0:0.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-0:0.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-0:0.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-0:1.20-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-FieldHash-debuginfo-0:1.20-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Hash-Util-debuginfo-0:0.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-I18N-Collate-0:1.02-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-I18N-LangTags-0:0.44-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-0:0.19-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-0:0.19-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-0:0.19-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-0:0.19-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-I18N-Langinfo-debuginfo-0:0.19-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-IO-0:1.43-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-IO-0:1.43-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-IO-0:1.43-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-IO-0:1.43-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-IO-debuginfo-0:1.43-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-IPC-Open3-0:1.21-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Locale-Maketext-Simple-1:0.21-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Math-Complex-0:1.59-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Memoize-0:1.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Module-Loaded-1:0.08-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-0:1.15-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-0:1.15-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-0:1.15-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-0:1.15-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-NDBM_File-debuginfo-0:1.15-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-NEXT-0:0.67-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Net-0:1.02-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-0:1.16-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-0:1.16-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-0:1.16-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-0:1.16-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-ODBM_File-debuginfo-0:1.16-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Opcode-0:1.48-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Opcode-0:1.48-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Opcode-0:1.48-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Opcode-0:1.48-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Opcode-debuginfo-0:1.48-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-POSIX-0:1.94-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-POSIX-0:1.94-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-POSIX-0:1.94-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-POSIX-0:1.94-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-POSIX-debuginfo-0:1.94-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Pod-Functions-0:1.13-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Pod-Html-0:1.25-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Safe-0:2.41-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Search-Dict-0:1.07-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-SelectSaver-0:1.02-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-SelfLoader-0:1.26-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Symbol-0:1.08-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-0:1.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-0:1.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-0:1.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-0:1.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Sys-Hostname-debuginfo-0:1.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Term-Complete-0:1.403-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Term-ReadLine-0:1.17-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Test-0:1.31-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Text-Abbrev-0:1.02-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Thread-0:3.05-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Thread-Semaphore-0:2.13-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Tie-0:4.6-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Tie-File-0:1.06-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Tie-Memoize-0:1.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Time-0:1.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-0:1.3401-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-0:1.3401-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-0:1.3401-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-0:1.3401-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-Time-Piece-debuginfo-0:1.3401-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-Unicode-UCD-0:0.75-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-User-pwent-0:1.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-autouse-0:1.11-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-base-0:2.27-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-blib-0:1.07-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-debugger-0:1.56-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-debugsource-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-deprecate-0:0.04-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-devel-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-diagnostics-0:1.37-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-doc-0:5.32.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-encoding-warnings-0:0.13-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-fields-0:2.27-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-filetest-0:1.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-if-0:0.60.800-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-interpreter-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-interpreter-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-interpreter-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-interpreter-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-interpreter-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-less-0:0.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-lib-0:0.65-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-lib-0:0.65-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-lib-0:0.65-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-lib-0:0.65-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-libnetcfg-4:5.32.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-libs-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-libs-debuginfo-4:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-locale-0:1.09-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-macros-4:5.32.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-meta-notation-0:5.32.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-mro-0:1.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-mro-0:1.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-mro-0:1.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-mro-0:1.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.i686",
"AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-mro-debuginfo-0:1.23-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-open-0:1.12-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-overload-0:1.31-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-overloading-0:0.02-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-ph-0:5.32.1-481.el9_4.1.aarch64",
"AppStream-9.4.0.Z.EUS:perl-ph-0:5.32.1-481.el9_4.1.ppc64le",
"AppStream-9.4.0.Z.EUS:perl-ph-0:5.32.1-481.el9_4.1.s390x",
"AppStream-9.4.0.Z.EUS:perl-ph-0:5.32.1-481.el9_4.1.x86_64",
"AppStream-9.4.0.Z.EUS:perl-sigtrap-0:1.09-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-sort-0:2.04-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-subs-0:1.03-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-utils-0:5.32.1-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-vars-0:1.05-481.el9_4.1.noarch",
"AppStream-9.4.0.Z.EUS:perl-vmsish-0:1.04-481.el9_4.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "perl: Perl threads have a working directory race condition where file operations may target unintended paths"
}
]
}
rhsa-2025:12056
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for perl is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Perl is a high-level programming language that is commonly used for system administration utilities and web programming.\n\nSecurity Fix(es):\n\n* perl: Perl threads have a working directory race condition where file operations may target unintended paths (CVE-2025-40909)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:12056",
"url": "https://access.redhat.com/errata/RHSA-2025:12056"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2369407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369407"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12056.json"
}
],
"title": "Red Hat Security Advisory: perl security update",
"tracking": {
"current_release_date": "2025-11-06T23:14:32+00:00",
"generator": {
"date": "2025-11-06T23:14:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2025:12056",
"initial_release_date": "2025-07-29T08:53:04+00:00",
"revision_history": [
{
"date": "2025-07-29T08:53:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-29T08:53:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:14:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-4:5.40.2-512.2.el10_0.src",
"product": {
"name": "perl-4:5.40.2-512.2.el10_0.src",
"product_id": "perl-4:5.40.2-512.2.el10_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl@5.40.2-512.2.el10_0?arch=src\u0026epoch=4"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-4:5.40.2-512.2.el10_0.aarch64",
"product": {
"name": "perl-4:5.40.2-512.2.el10_0.aarch64",
"product_id": "perl-4:5.40.2-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl@5.40.2-512.2.el10_0?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-0:1.89-512.2.el10_0.aarch64",
"product": {
"name": "perl-B-0:1.89-512.2.el10_0.aarch64",
"product_id": "perl-B-0:1.89-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B@1.89-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-0:1.34-512.2.el10_0.aarch64",
"product": {
"name": "perl-Devel-Peek-0:1.34-512.2.el10_0.aarch64",
"product_id": "perl-Devel-Peek-0:1.34-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek@1.34-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-DynaLoader-0:1.56-512.2.el10_0.aarch64",
"product": {
"name": "perl-DynaLoader-0:1.56-512.2.el10_0.aarch64",
"product_id": "perl-DynaLoader-0:1.56-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-DynaLoader@1.56-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Errno-0:1.38-512.2.el10_0.aarch64",
"product": {
"name": "perl-Errno-0:1.38-512.2.el10_0.aarch64",
"product_id": "perl-Errno-0:1.38-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Errno@1.38-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-0:1.18-512.2.el10_0.aarch64",
"product": {
"name": "perl-Fcntl-0:1.18-512.2.el10_0.aarch64",
"product_id": "perl-Fcntl-0:1.18-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl@1.18-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-0:1.12-512.2.el10_0.aarch64",
"product": {
"name": "perl-File-DosGlob-0:1.12-512.2.el10_0.aarch64",
"product_id": "perl-File-DosGlob-0:1.12-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob@1.12-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-1:1.24-512.2.el10_0.aarch64",
"product": {
"name": "perl-GDBM_File-1:1.24-512.2.el10_0.aarch64",
"product_id": "perl-GDBM_File-1:1.24-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File@1.24-512.2.el10_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-0:0.32-512.2.el10_0.aarch64",
"product": {
"name": "perl-Hash-Util-0:0.32-512.2.el10_0.aarch64",
"product_id": "perl-Hash-Util-0:0.32-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util@0.32-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.aarch64",
"product": {
"name": "perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.aarch64",
"product_id": "perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash@1.27-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-0:0.24-512.2.el10_0.aarch64",
"product": {
"name": "perl-I18N-Langinfo-0:0.24-512.2.el10_0.aarch64",
"product_id": "perl-I18N-Langinfo-0:0.24-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo@0.24-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-IO-0:1.55-512.2.el10_0.aarch64",
"product": {
"name": "perl-IO-0:1.55-512.2.el10_0.aarch64",
"product_id": "perl-IO-0:1.55-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO@1.55-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-0:1.17-512.2.el10_0.aarch64",
"product": {
"name": "perl-NDBM_File-0:1.17-512.2.el10_0.aarch64",
"product_id": "perl-NDBM_File-0:1.17-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File@1.17-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-0:1.18-512.2.el10_0.aarch64",
"product": {
"name": "perl-ODBM_File-0:1.18-512.2.el10_0.aarch64",
"product_id": "perl-ODBM_File-0:1.18-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File@1.18-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-0:1.65-512.2.el10_0.aarch64",
"product": {
"name": "perl-Opcode-0:1.65-512.2.el10_0.aarch64",
"product_id": "perl-Opcode-0:1.65-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode@1.65-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-0:2.20-512.2.el10_0.aarch64",
"product": {
"name": "perl-POSIX-0:2.20-512.2.el10_0.aarch64",
"product_id": "perl-POSIX-0:2.20-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX@2.20-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-0:1.25-512.2.el10_0.aarch64",
"product": {
"name": "perl-Sys-Hostname-0:1.25-512.2.el10_0.aarch64",
"product_id": "perl-Sys-Hostname-0:1.25-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname@1.25-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-0:1.3401-512.2.el10_0.aarch64",
"product": {
"name": "perl-Time-Piece-0:1.3401-512.2.el10_0.aarch64",
"product_id": "perl-Time-Piece-0:1.3401-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece@1.3401-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-devel-4:5.40.2-512.2.el10_0.aarch64",
"product": {
"name": "perl-devel-4:5.40.2-512.2.el10_0.aarch64",
"product_id": "perl-devel-4:5.40.2-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-devel@5.40.2-512.2.el10_0?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-4:5.40.2-512.2.el10_0.aarch64",
"product": {
"name": "perl-interpreter-4:5.40.2-512.2.el10_0.aarch64",
"product_id": "perl-interpreter-4:5.40.2-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter@5.40.2-512.2.el10_0?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-lib-0:0.65-512.2.el10_0.aarch64",
"product": {
"name": "perl-lib-0:0.65-512.2.el10_0.aarch64",
"product_id": "perl-lib-0:0.65-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-lib@0.65-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-libs-4:5.40.2-512.2.el10_0.aarch64",
"product": {
"name": "perl-libs-4:5.40.2-512.2.el10_0.aarch64",
"product_id": "perl-libs-4:5.40.2-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs@5.40.2-512.2.el10_0?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-0:1.29-512.2.el10_0.aarch64",
"product": {
"name": "perl-mro-0:1.29-512.2.el10_0.aarch64",
"product_id": "perl-mro-0:1.29-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro@1.29-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-ph-0:5.40.2-512.2.el10_0.aarch64",
"product": {
"name": "perl-ph-0:5.40.2-512.2.el10_0.aarch64",
"product_id": "perl-ph-0:5.40.2-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ph@5.40.2-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-debugsource-4:5.40.2-512.2.el10_0.aarch64",
"product": {
"name": "perl-debugsource-4:5.40.2-512.2.el10_0.aarch64",
"product_id": "perl-debugsource-4:5.40.2-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debugsource@5.40.2-512.2.el10_0?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-debuginfo-0:1.89-512.2.el10_0.aarch64",
"product": {
"name": "perl-B-debuginfo-0:1.89-512.2.el10_0.aarch64",
"product_id": "perl-B-debuginfo-0:1.89-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B-debuginfo@1.89-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.aarch64",
"product": {
"name": "perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.aarch64",
"product_id": "perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek-debuginfo@1.34-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.aarch64",
"product": {
"name": "perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.aarch64",
"product_id": "perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl-debuginfo@1.18-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.aarch64",
"product": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.aarch64",
"product_id": "perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob-debuginfo@1.12-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.aarch64",
"product": {
"name": "perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.aarch64",
"product_id": "perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File-debuginfo@1.24-512.2.el10_0?arch=aarch64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.aarch64",
"product": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.aarch64",
"product_id": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash-debuginfo@1.27-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.aarch64",
"product": {
"name": "perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.aarch64",
"product_id": "perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-debuginfo@0.32-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.aarch64",
"product": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.aarch64",
"product_id": "perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo-debuginfo@0.24-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-IO-debuginfo-0:1.55-512.2.el10_0.aarch64",
"product": {
"name": "perl-IO-debuginfo-0:1.55-512.2.el10_0.aarch64",
"product_id": "perl-IO-debuginfo-0:1.55-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO-debuginfo@1.55-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.aarch64",
"product": {
"name": "perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.aarch64",
"product_id": "perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File-debuginfo@1.17-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.aarch64",
"product": {
"name": "perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.aarch64",
"product_id": "perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File-debuginfo@1.18-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-debuginfo-0:1.65-512.2.el10_0.aarch64",
"product": {
"name": "perl-Opcode-debuginfo-0:1.65-512.2.el10_0.aarch64",
"product_id": "perl-Opcode-debuginfo-0:1.65-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode-debuginfo@1.65-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-debuginfo-0:2.20-512.2.el10_0.aarch64",
"product": {
"name": "perl-POSIX-debuginfo-0:2.20-512.2.el10_0.aarch64",
"product_id": "perl-POSIX-debuginfo-0:2.20-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX-debuginfo@2.20-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.aarch64",
"product": {
"name": "perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.aarch64",
"product_id": "perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname-debuginfo@1.25-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.aarch64",
"product": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.aarch64",
"product_id": "perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece-debuginfo@1.3401-512.2.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"product": {
"name": "perl-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"product_id": "perl-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debuginfo@5.40.2-512.2.el10_0?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"product": {
"name": "perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"product_id": "perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter-debuginfo@5.40.2-512.2.el10_0?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"product": {
"name": "perl-libs-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"product_id": "perl-libs-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs-debuginfo@5.40.2-512.2.el10_0?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-debuginfo-0:1.29-512.2.el10_0.aarch64",
"product": {
"name": "perl-mro-debuginfo-0:1.29-512.2.el10_0.aarch64",
"product_id": "perl-mro-debuginfo-0:1.29-512.2.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro-debuginfo@1.29-512.2.el10_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-4:5.40.2-512.2.el10_0.ppc64le",
"product": {
"name": "perl-4:5.40.2-512.2.el10_0.ppc64le",
"product_id": "perl-4:5.40.2-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl@5.40.2-512.2.el10_0?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-0:1.89-512.2.el10_0.ppc64le",
"product": {
"name": "perl-B-0:1.89-512.2.el10_0.ppc64le",
"product_id": "perl-B-0:1.89-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B@1.89-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-0:1.34-512.2.el10_0.ppc64le",
"product": {
"name": "perl-Devel-Peek-0:1.34-512.2.el10_0.ppc64le",
"product_id": "perl-Devel-Peek-0:1.34-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek@1.34-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-DynaLoader-0:1.56-512.2.el10_0.ppc64le",
"product": {
"name": "perl-DynaLoader-0:1.56-512.2.el10_0.ppc64le",
"product_id": "perl-DynaLoader-0:1.56-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-DynaLoader@1.56-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Errno-0:1.38-512.2.el10_0.ppc64le",
"product": {
"name": "perl-Errno-0:1.38-512.2.el10_0.ppc64le",
"product_id": "perl-Errno-0:1.38-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Errno@1.38-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-0:1.18-512.2.el10_0.ppc64le",
"product": {
"name": "perl-Fcntl-0:1.18-512.2.el10_0.ppc64le",
"product_id": "perl-Fcntl-0:1.18-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl@1.18-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-0:1.12-512.2.el10_0.ppc64le",
"product": {
"name": "perl-File-DosGlob-0:1.12-512.2.el10_0.ppc64le",
"product_id": "perl-File-DosGlob-0:1.12-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob@1.12-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-1:1.24-512.2.el10_0.ppc64le",
"product": {
"name": "perl-GDBM_File-1:1.24-512.2.el10_0.ppc64le",
"product_id": "perl-GDBM_File-1:1.24-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File@1.24-512.2.el10_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-0:0.32-512.2.el10_0.ppc64le",
"product": {
"name": "perl-Hash-Util-0:0.32-512.2.el10_0.ppc64le",
"product_id": "perl-Hash-Util-0:0.32-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util@0.32-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.ppc64le",
"product": {
"name": "perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.ppc64le",
"product_id": "perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash@1.27-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-0:0.24-512.2.el10_0.ppc64le",
"product": {
"name": "perl-I18N-Langinfo-0:0.24-512.2.el10_0.ppc64le",
"product_id": "perl-I18N-Langinfo-0:0.24-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo@0.24-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-IO-0:1.55-512.2.el10_0.ppc64le",
"product": {
"name": "perl-IO-0:1.55-512.2.el10_0.ppc64le",
"product_id": "perl-IO-0:1.55-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO@1.55-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-0:1.17-512.2.el10_0.ppc64le",
"product": {
"name": "perl-NDBM_File-0:1.17-512.2.el10_0.ppc64le",
"product_id": "perl-NDBM_File-0:1.17-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File@1.17-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-0:1.18-512.2.el10_0.ppc64le",
"product": {
"name": "perl-ODBM_File-0:1.18-512.2.el10_0.ppc64le",
"product_id": "perl-ODBM_File-0:1.18-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File@1.18-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-0:1.65-512.2.el10_0.ppc64le",
"product": {
"name": "perl-Opcode-0:1.65-512.2.el10_0.ppc64le",
"product_id": "perl-Opcode-0:1.65-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode@1.65-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-0:2.20-512.2.el10_0.ppc64le",
"product": {
"name": "perl-POSIX-0:2.20-512.2.el10_0.ppc64le",
"product_id": "perl-POSIX-0:2.20-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX@2.20-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-0:1.25-512.2.el10_0.ppc64le",
"product": {
"name": "perl-Sys-Hostname-0:1.25-512.2.el10_0.ppc64le",
"product_id": "perl-Sys-Hostname-0:1.25-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname@1.25-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-0:1.3401-512.2.el10_0.ppc64le",
"product": {
"name": "perl-Time-Piece-0:1.3401-512.2.el10_0.ppc64le",
"product_id": "perl-Time-Piece-0:1.3401-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece@1.3401-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-devel-4:5.40.2-512.2.el10_0.ppc64le",
"product": {
"name": "perl-devel-4:5.40.2-512.2.el10_0.ppc64le",
"product_id": "perl-devel-4:5.40.2-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-devel@5.40.2-512.2.el10_0?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-4:5.40.2-512.2.el10_0.ppc64le",
"product": {
"name": "perl-interpreter-4:5.40.2-512.2.el10_0.ppc64le",
"product_id": "perl-interpreter-4:5.40.2-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter@5.40.2-512.2.el10_0?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-lib-0:0.65-512.2.el10_0.ppc64le",
"product": {
"name": "perl-lib-0:0.65-512.2.el10_0.ppc64le",
"product_id": "perl-lib-0:0.65-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-lib@0.65-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-libs-4:5.40.2-512.2.el10_0.ppc64le",
"product": {
"name": "perl-libs-4:5.40.2-512.2.el10_0.ppc64le",
"product_id": "perl-libs-4:5.40.2-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs@5.40.2-512.2.el10_0?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-0:1.29-512.2.el10_0.ppc64le",
"product": {
"name": "perl-mro-0:1.29-512.2.el10_0.ppc64le",
"product_id": "perl-mro-0:1.29-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro@1.29-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-ph-0:5.40.2-512.2.el10_0.ppc64le",
"product": {
"name": "perl-ph-0:5.40.2-512.2.el10_0.ppc64le",
"product_id": "perl-ph-0:5.40.2-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ph@5.40.2-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-debugsource-4:5.40.2-512.2.el10_0.ppc64le",
"product": {
"name": "perl-debugsource-4:5.40.2-512.2.el10_0.ppc64le",
"product_id": "perl-debugsource-4:5.40.2-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debugsource@5.40.2-512.2.el10_0?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-debuginfo-0:1.89-512.2.el10_0.ppc64le",
"product": {
"name": "perl-B-debuginfo-0:1.89-512.2.el10_0.ppc64le",
"product_id": "perl-B-debuginfo-0:1.89-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B-debuginfo@1.89-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.ppc64le",
"product": {
"name": "perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.ppc64le",
"product_id": "perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek-debuginfo@1.34-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.ppc64le",
"product": {
"name": "perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.ppc64le",
"product_id": "perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl-debuginfo@1.18-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.ppc64le",
"product": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.ppc64le",
"product_id": "perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob-debuginfo@1.12-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.ppc64le",
"product": {
"name": "perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.ppc64le",
"product_id": "perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File-debuginfo@1.24-512.2.el10_0?arch=ppc64le\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.ppc64le",
"product": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.ppc64le",
"product_id": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash-debuginfo@1.27-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.ppc64le",
"product": {
"name": "perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.ppc64le",
"product_id": "perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-debuginfo@0.32-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.ppc64le",
"product": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.ppc64le",
"product_id": "perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo-debuginfo@0.24-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-IO-debuginfo-0:1.55-512.2.el10_0.ppc64le",
"product": {
"name": "perl-IO-debuginfo-0:1.55-512.2.el10_0.ppc64le",
"product_id": "perl-IO-debuginfo-0:1.55-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO-debuginfo@1.55-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.ppc64le",
"product": {
"name": "perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.ppc64le",
"product_id": "perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File-debuginfo@1.17-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.ppc64le",
"product": {
"name": "perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.ppc64le",
"product_id": "perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File-debuginfo@1.18-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-debuginfo-0:1.65-512.2.el10_0.ppc64le",
"product": {
"name": "perl-Opcode-debuginfo-0:1.65-512.2.el10_0.ppc64le",
"product_id": "perl-Opcode-debuginfo-0:1.65-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode-debuginfo@1.65-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-debuginfo-0:2.20-512.2.el10_0.ppc64le",
"product": {
"name": "perl-POSIX-debuginfo-0:2.20-512.2.el10_0.ppc64le",
"product_id": "perl-POSIX-debuginfo-0:2.20-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX-debuginfo@2.20-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.ppc64le",
"product": {
"name": "perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.ppc64le",
"product_id": "perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname-debuginfo@1.25-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.ppc64le",
"product": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.ppc64le",
"product_id": "perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece-debuginfo@1.3401-512.2.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"product": {
"name": "perl-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"product_id": "perl-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debuginfo@5.40.2-512.2.el10_0?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"product": {
"name": "perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"product_id": "perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter-debuginfo@5.40.2-512.2.el10_0?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"product": {
"name": "perl-libs-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"product_id": "perl-libs-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs-debuginfo@5.40.2-512.2.el10_0?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-debuginfo-0:1.29-512.2.el10_0.ppc64le",
"product": {
"name": "perl-mro-debuginfo-0:1.29-512.2.el10_0.ppc64le",
"product_id": "perl-mro-debuginfo-0:1.29-512.2.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro-debuginfo@1.29-512.2.el10_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-4:5.40.2-512.2.el10_0.x86_64",
"product": {
"name": "perl-4:5.40.2-512.2.el10_0.x86_64",
"product_id": "perl-4:5.40.2-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl@5.40.2-512.2.el10_0?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-0:1.89-512.2.el10_0.x86_64",
"product": {
"name": "perl-B-0:1.89-512.2.el10_0.x86_64",
"product_id": "perl-B-0:1.89-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B@1.89-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-0:1.34-512.2.el10_0.x86_64",
"product": {
"name": "perl-Devel-Peek-0:1.34-512.2.el10_0.x86_64",
"product_id": "perl-Devel-Peek-0:1.34-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek@1.34-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-DynaLoader-0:1.56-512.2.el10_0.x86_64",
"product": {
"name": "perl-DynaLoader-0:1.56-512.2.el10_0.x86_64",
"product_id": "perl-DynaLoader-0:1.56-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-DynaLoader@1.56-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Errno-0:1.38-512.2.el10_0.x86_64",
"product": {
"name": "perl-Errno-0:1.38-512.2.el10_0.x86_64",
"product_id": "perl-Errno-0:1.38-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Errno@1.38-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-0:1.18-512.2.el10_0.x86_64",
"product": {
"name": "perl-Fcntl-0:1.18-512.2.el10_0.x86_64",
"product_id": "perl-Fcntl-0:1.18-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl@1.18-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-0:1.12-512.2.el10_0.x86_64",
"product": {
"name": "perl-File-DosGlob-0:1.12-512.2.el10_0.x86_64",
"product_id": "perl-File-DosGlob-0:1.12-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob@1.12-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-1:1.24-512.2.el10_0.x86_64",
"product": {
"name": "perl-GDBM_File-1:1.24-512.2.el10_0.x86_64",
"product_id": "perl-GDBM_File-1:1.24-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File@1.24-512.2.el10_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-0:0.32-512.2.el10_0.x86_64",
"product": {
"name": "perl-Hash-Util-0:0.32-512.2.el10_0.x86_64",
"product_id": "perl-Hash-Util-0:0.32-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util@0.32-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.x86_64",
"product": {
"name": "perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.x86_64",
"product_id": "perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash@1.27-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-0:0.24-512.2.el10_0.x86_64",
"product": {
"name": "perl-I18N-Langinfo-0:0.24-512.2.el10_0.x86_64",
"product_id": "perl-I18N-Langinfo-0:0.24-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo@0.24-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-IO-0:1.55-512.2.el10_0.x86_64",
"product": {
"name": "perl-IO-0:1.55-512.2.el10_0.x86_64",
"product_id": "perl-IO-0:1.55-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO@1.55-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-0:1.17-512.2.el10_0.x86_64",
"product": {
"name": "perl-NDBM_File-0:1.17-512.2.el10_0.x86_64",
"product_id": "perl-NDBM_File-0:1.17-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File@1.17-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-0:1.18-512.2.el10_0.x86_64",
"product": {
"name": "perl-ODBM_File-0:1.18-512.2.el10_0.x86_64",
"product_id": "perl-ODBM_File-0:1.18-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File@1.18-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-0:1.65-512.2.el10_0.x86_64",
"product": {
"name": "perl-Opcode-0:1.65-512.2.el10_0.x86_64",
"product_id": "perl-Opcode-0:1.65-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode@1.65-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-0:2.20-512.2.el10_0.x86_64",
"product": {
"name": "perl-POSIX-0:2.20-512.2.el10_0.x86_64",
"product_id": "perl-POSIX-0:2.20-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX@2.20-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-0:1.25-512.2.el10_0.x86_64",
"product": {
"name": "perl-Sys-Hostname-0:1.25-512.2.el10_0.x86_64",
"product_id": "perl-Sys-Hostname-0:1.25-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname@1.25-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-0:1.3401-512.2.el10_0.x86_64",
"product": {
"name": "perl-Time-Piece-0:1.3401-512.2.el10_0.x86_64",
"product_id": "perl-Time-Piece-0:1.3401-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece@1.3401-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-devel-4:5.40.2-512.2.el10_0.x86_64",
"product": {
"name": "perl-devel-4:5.40.2-512.2.el10_0.x86_64",
"product_id": "perl-devel-4:5.40.2-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-devel@5.40.2-512.2.el10_0?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-4:5.40.2-512.2.el10_0.x86_64",
"product": {
"name": "perl-interpreter-4:5.40.2-512.2.el10_0.x86_64",
"product_id": "perl-interpreter-4:5.40.2-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter@5.40.2-512.2.el10_0?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-lib-0:0.65-512.2.el10_0.x86_64",
"product": {
"name": "perl-lib-0:0.65-512.2.el10_0.x86_64",
"product_id": "perl-lib-0:0.65-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-lib@0.65-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-libs-4:5.40.2-512.2.el10_0.x86_64",
"product": {
"name": "perl-libs-4:5.40.2-512.2.el10_0.x86_64",
"product_id": "perl-libs-4:5.40.2-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs@5.40.2-512.2.el10_0?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-0:1.29-512.2.el10_0.x86_64",
"product": {
"name": "perl-mro-0:1.29-512.2.el10_0.x86_64",
"product_id": "perl-mro-0:1.29-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro@1.29-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-ph-0:5.40.2-512.2.el10_0.x86_64",
"product": {
"name": "perl-ph-0:5.40.2-512.2.el10_0.x86_64",
"product_id": "perl-ph-0:5.40.2-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ph@5.40.2-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-debugsource-4:5.40.2-512.2.el10_0.x86_64",
"product": {
"name": "perl-debugsource-4:5.40.2-512.2.el10_0.x86_64",
"product_id": "perl-debugsource-4:5.40.2-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debugsource@5.40.2-512.2.el10_0?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-debuginfo-0:1.89-512.2.el10_0.x86_64",
"product": {
"name": "perl-B-debuginfo-0:1.89-512.2.el10_0.x86_64",
"product_id": "perl-B-debuginfo-0:1.89-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B-debuginfo@1.89-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.x86_64",
"product": {
"name": "perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.x86_64",
"product_id": "perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek-debuginfo@1.34-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.x86_64",
"product": {
"name": "perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.x86_64",
"product_id": "perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl-debuginfo@1.18-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.x86_64",
"product": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.x86_64",
"product_id": "perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob-debuginfo@1.12-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.x86_64",
"product": {
"name": "perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.x86_64",
"product_id": "perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File-debuginfo@1.24-512.2.el10_0?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.x86_64",
"product": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.x86_64",
"product_id": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash-debuginfo@1.27-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.x86_64",
"product": {
"name": "perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.x86_64",
"product_id": "perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-debuginfo@0.32-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.x86_64",
"product": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.x86_64",
"product_id": "perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo-debuginfo@0.24-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-IO-debuginfo-0:1.55-512.2.el10_0.x86_64",
"product": {
"name": "perl-IO-debuginfo-0:1.55-512.2.el10_0.x86_64",
"product_id": "perl-IO-debuginfo-0:1.55-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO-debuginfo@1.55-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.x86_64",
"product": {
"name": "perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.x86_64",
"product_id": "perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File-debuginfo@1.17-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.x86_64",
"product": {
"name": "perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.x86_64",
"product_id": "perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File-debuginfo@1.18-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-debuginfo-0:1.65-512.2.el10_0.x86_64",
"product": {
"name": "perl-Opcode-debuginfo-0:1.65-512.2.el10_0.x86_64",
"product_id": "perl-Opcode-debuginfo-0:1.65-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode-debuginfo@1.65-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-debuginfo-0:2.20-512.2.el10_0.x86_64",
"product": {
"name": "perl-POSIX-debuginfo-0:2.20-512.2.el10_0.x86_64",
"product_id": "perl-POSIX-debuginfo-0:2.20-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX-debuginfo@2.20-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.x86_64",
"product": {
"name": "perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.x86_64",
"product_id": "perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname-debuginfo@1.25-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.x86_64",
"product": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.x86_64",
"product_id": "perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece-debuginfo@1.3401-512.2.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"product": {
"name": "perl-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"product_id": "perl-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debuginfo@5.40.2-512.2.el10_0?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"product": {
"name": "perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"product_id": "perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter-debuginfo@5.40.2-512.2.el10_0?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"product": {
"name": "perl-libs-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"product_id": "perl-libs-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs-debuginfo@5.40.2-512.2.el10_0?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-debuginfo-0:1.29-512.2.el10_0.x86_64",
"product": {
"name": "perl-mro-debuginfo-0:1.29-512.2.el10_0.x86_64",
"product_id": "perl-mro-debuginfo-0:1.29-512.2.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro-debuginfo@1.29-512.2.el10_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-4:5.40.2-512.2.el10_0.s390x",
"product": {
"name": "perl-4:5.40.2-512.2.el10_0.s390x",
"product_id": "perl-4:5.40.2-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl@5.40.2-512.2.el10_0?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-0:1.89-512.2.el10_0.s390x",
"product": {
"name": "perl-B-0:1.89-512.2.el10_0.s390x",
"product_id": "perl-B-0:1.89-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B@1.89-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-0:1.34-512.2.el10_0.s390x",
"product": {
"name": "perl-Devel-Peek-0:1.34-512.2.el10_0.s390x",
"product_id": "perl-Devel-Peek-0:1.34-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek@1.34-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-DynaLoader-0:1.56-512.2.el10_0.s390x",
"product": {
"name": "perl-DynaLoader-0:1.56-512.2.el10_0.s390x",
"product_id": "perl-DynaLoader-0:1.56-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-DynaLoader@1.56-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Errno-0:1.38-512.2.el10_0.s390x",
"product": {
"name": "perl-Errno-0:1.38-512.2.el10_0.s390x",
"product_id": "perl-Errno-0:1.38-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Errno@1.38-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-0:1.18-512.2.el10_0.s390x",
"product": {
"name": "perl-Fcntl-0:1.18-512.2.el10_0.s390x",
"product_id": "perl-Fcntl-0:1.18-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl@1.18-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-0:1.12-512.2.el10_0.s390x",
"product": {
"name": "perl-File-DosGlob-0:1.12-512.2.el10_0.s390x",
"product_id": "perl-File-DosGlob-0:1.12-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob@1.12-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-1:1.24-512.2.el10_0.s390x",
"product": {
"name": "perl-GDBM_File-1:1.24-512.2.el10_0.s390x",
"product_id": "perl-GDBM_File-1:1.24-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File@1.24-512.2.el10_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-0:0.32-512.2.el10_0.s390x",
"product": {
"name": "perl-Hash-Util-0:0.32-512.2.el10_0.s390x",
"product_id": "perl-Hash-Util-0:0.32-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util@0.32-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.s390x",
"product": {
"name": "perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.s390x",
"product_id": "perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash@1.27-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-0:0.24-512.2.el10_0.s390x",
"product": {
"name": "perl-I18N-Langinfo-0:0.24-512.2.el10_0.s390x",
"product_id": "perl-I18N-Langinfo-0:0.24-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo@0.24-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-IO-0:1.55-512.2.el10_0.s390x",
"product": {
"name": "perl-IO-0:1.55-512.2.el10_0.s390x",
"product_id": "perl-IO-0:1.55-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO@1.55-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-0:1.17-512.2.el10_0.s390x",
"product": {
"name": "perl-NDBM_File-0:1.17-512.2.el10_0.s390x",
"product_id": "perl-NDBM_File-0:1.17-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File@1.17-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-0:1.18-512.2.el10_0.s390x",
"product": {
"name": "perl-ODBM_File-0:1.18-512.2.el10_0.s390x",
"product_id": "perl-ODBM_File-0:1.18-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File@1.18-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-0:1.65-512.2.el10_0.s390x",
"product": {
"name": "perl-Opcode-0:1.65-512.2.el10_0.s390x",
"product_id": "perl-Opcode-0:1.65-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode@1.65-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-0:2.20-512.2.el10_0.s390x",
"product": {
"name": "perl-POSIX-0:2.20-512.2.el10_0.s390x",
"product_id": "perl-POSIX-0:2.20-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX@2.20-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-0:1.25-512.2.el10_0.s390x",
"product": {
"name": "perl-Sys-Hostname-0:1.25-512.2.el10_0.s390x",
"product_id": "perl-Sys-Hostname-0:1.25-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname@1.25-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-0:1.3401-512.2.el10_0.s390x",
"product": {
"name": "perl-Time-Piece-0:1.3401-512.2.el10_0.s390x",
"product_id": "perl-Time-Piece-0:1.3401-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece@1.3401-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-devel-4:5.40.2-512.2.el10_0.s390x",
"product": {
"name": "perl-devel-4:5.40.2-512.2.el10_0.s390x",
"product_id": "perl-devel-4:5.40.2-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-devel@5.40.2-512.2.el10_0?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-4:5.40.2-512.2.el10_0.s390x",
"product": {
"name": "perl-interpreter-4:5.40.2-512.2.el10_0.s390x",
"product_id": "perl-interpreter-4:5.40.2-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter@5.40.2-512.2.el10_0?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-lib-0:0.65-512.2.el10_0.s390x",
"product": {
"name": "perl-lib-0:0.65-512.2.el10_0.s390x",
"product_id": "perl-lib-0:0.65-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-lib@0.65-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-libs-4:5.40.2-512.2.el10_0.s390x",
"product": {
"name": "perl-libs-4:5.40.2-512.2.el10_0.s390x",
"product_id": "perl-libs-4:5.40.2-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs@5.40.2-512.2.el10_0?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-0:1.29-512.2.el10_0.s390x",
"product": {
"name": "perl-mro-0:1.29-512.2.el10_0.s390x",
"product_id": "perl-mro-0:1.29-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro@1.29-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-ph-0:5.40.2-512.2.el10_0.s390x",
"product": {
"name": "perl-ph-0:5.40.2-512.2.el10_0.s390x",
"product_id": "perl-ph-0:5.40.2-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ph@5.40.2-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-debugsource-4:5.40.2-512.2.el10_0.s390x",
"product": {
"name": "perl-debugsource-4:5.40.2-512.2.el10_0.s390x",
"product_id": "perl-debugsource-4:5.40.2-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debugsource@5.40.2-512.2.el10_0?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-B-debuginfo-0:1.89-512.2.el10_0.s390x",
"product": {
"name": "perl-B-debuginfo-0:1.89-512.2.el10_0.s390x",
"product_id": "perl-B-debuginfo-0:1.89-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-B-debuginfo@1.89-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.s390x",
"product": {
"name": "perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.s390x",
"product_id": "perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek-debuginfo@1.34-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.s390x",
"product": {
"name": "perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.s390x",
"product_id": "perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Fcntl-debuginfo@1.18-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.s390x",
"product": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.s390x",
"product_id": "perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-DosGlob-debuginfo@1.12-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.s390x",
"product": {
"name": "perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.s390x",
"product_id": "perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-GDBM_File-debuginfo@1.24-512.2.el10_0?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.s390x",
"product": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.s390x",
"product_id": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-FieldHash-debuginfo@1.27-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.s390x",
"product": {
"name": "perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.s390x",
"product_id": "perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Hash-Util-debuginfo@0.32-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.s390x",
"product": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.s390x",
"product_id": "perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Langinfo-debuginfo@0.24-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-IO-debuginfo-0:1.55-512.2.el10_0.s390x",
"product": {
"name": "perl-IO-debuginfo-0:1.55-512.2.el10_0.s390x",
"product_id": "perl-IO-debuginfo-0:1.55-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO-debuginfo@1.55-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.s390x",
"product": {
"name": "perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.s390x",
"product_id": "perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NDBM_File-debuginfo@1.17-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.s390x",
"product": {
"name": "perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.s390x",
"product_id": "perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ODBM_File-debuginfo@1.18-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Opcode-debuginfo-0:1.65-512.2.el10_0.s390x",
"product": {
"name": "perl-Opcode-debuginfo-0:1.65-512.2.el10_0.s390x",
"product_id": "perl-Opcode-debuginfo-0:1.65-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Opcode-debuginfo@1.65-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-POSIX-debuginfo-0:2.20-512.2.el10_0.s390x",
"product": {
"name": "perl-POSIX-debuginfo-0:2.20-512.2.el10_0.s390x",
"product_id": "perl-POSIX-debuginfo-0:2.20-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-POSIX-debuginfo@2.20-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.s390x",
"product": {
"name": "perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.s390x",
"product_id": "perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Sys-Hostname-debuginfo@1.25-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.s390x",
"product": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.s390x",
"product_id": "perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece-debuginfo@1.3401-512.2.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"product": {
"name": "perl-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"product_id": "perl-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debuginfo@5.40.2-512.2.el10_0?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"product": {
"name": "perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"product_id": "perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter-debuginfo@5.40.2-512.2.el10_0?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"product": {
"name": "perl-libs-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"product_id": "perl-libs-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs-debuginfo@5.40.2-512.2.el10_0?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-mro-debuginfo-0:1.29-512.2.el10_0.s390x",
"product": {
"name": "perl-mro-debuginfo-0:1.29-512.2.el10_0.s390x",
"product_id": "perl-mro-debuginfo-0:1.29-512.2.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-mro-debuginfo@1.29-512.2.el10_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-Attribute-Handlers-0:1.03-512.2.el10_0.noarch",
"product": {
"name": "perl-Attribute-Handlers-0:1.03-512.2.el10_0.noarch",
"product_id": "perl-Attribute-Handlers-0:1.03-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Attribute-Handlers@1.03-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-AutoLoader-0:5.74-512.2.el10_0.noarch",
"product": {
"name": "perl-AutoLoader-0:5.74-512.2.el10_0.noarch",
"product_id": "perl-AutoLoader-0:5.74-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-AutoLoader@5.74-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-AutoSplit-0:5.74-512.2.el10_0.noarch",
"product": {
"name": "perl-AutoSplit-0:5.74-512.2.el10_0.noarch",
"product_id": "perl-AutoSplit-0:5.74-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-AutoSplit@5.74-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Benchmark-0:1.25-512.2.el10_0.noarch",
"product": {
"name": "perl-Benchmark-0:1.25-512.2.el10_0.noarch",
"product_id": "perl-Benchmark-0:1.25-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Benchmark@1.25-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Class-Struct-0:0.68-512.2.el10_0.noarch",
"product": {
"name": "perl-Class-Struct-0:0.68-512.2.el10_0.noarch",
"product_id": "perl-Class-Struct-0:0.68-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Class-Struct@0.68-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Config-Extensions-0:0.03-512.2.el10_0.noarch",
"product": {
"name": "perl-Config-Extensions-0:0.03-512.2.el10_0.noarch",
"product_id": "perl-Config-Extensions-0:0.03-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Config-Extensions@0.03-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-DBM_Filter-0:0.06-512.2.el10_0.noarch",
"product": {
"name": "perl-DBM_Filter-0:0.06-512.2.el10_0.noarch",
"product_id": "perl-DBM_Filter-0:0.06-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-DBM_Filter@0.06-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-SelfStubber-0:1.06-512.2.el10_0.noarch",
"product": {
"name": "perl-Devel-SelfStubber-0:1.06-512.2.el10_0.noarch",
"product_id": "perl-Devel-SelfStubber-0:1.06-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-SelfStubber@1.06-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-DirHandle-0:1.05-512.2.el10_0.noarch",
"product": {
"name": "perl-DirHandle-0:1.05-512.2.el10_0.noarch",
"product_id": "perl-DirHandle-0:1.05-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-DirHandle@1.05-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Dumpvalue-0:2.27-512.2.el10_0.noarch",
"product": {
"name": "perl-Dumpvalue-0:2.27-512.2.el10_0.noarch",
"product_id": "perl-Dumpvalue-0:2.27-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Dumpvalue@2.27-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-English-0:1.11-512.2.el10_0.noarch",
"product": {
"name": "perl-English-0:1.11-512.2.el10_0.noarch",
"product_id": "perl-English-0:1.11-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-English@1.11-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-ExtUtils-Constant-0:0.25-512.2.el10_0.noarch",
"product": {
"name": "perl-ExtUtils-Constant-0:0.25-512.2.el10_0.noarch",
"product_id": "perl-ExtUtils-Constant-0:0.25-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ExtUtils-Constant@0.25-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-ExtUtils-Embed-0:1.35-512.2.el10_0.noarch",
"product": {
"name": "perl-ExtUtils-Embed-0:1.35-512.2.el10_0.noarch",
"product_id": "perl-ExtUtils-Embed-0:1.35-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ExtUtils-Embed@1.35-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-ExtUtils-Miniperl-0:1.14-512.2.el10_0.noarch",
"product": {
"name": "perl-ExtUtils-Miniperl-0:1.14-512.2.el10_0.noarch",
"product_id": "perl-ExtUtils-Miniperl-0:1.14-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ExtUtils-Miniperl@1.14-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-File-Basename-0:2.86-512.2.el10_0.noarch",
"product": {
"name": "perl-File-Basename-0:2.86-512.2.el10_0.noarch",
"product_id": "perl-File-Basename-0:2.86-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-Basename@2.86-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-File-Compare-0:1.100.800-512.2.el10_0.noarch",
"product": {
"name": "perl-File-Compare-0:1.100.800-512.2.el10_0.noarch",
"product_id": "perl-File-Compare-0:1.100.800-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-Compare@1.100.800-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-File-Copy-0:2.41-512.2.el10_0.noarch",
"product": {
"name": "perl-File-Copy-0:2.41-512.2.el10_0.noarch",
"product_id": "perl-File-Copy-0:2.41-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-Copy@2.41-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-File-Find-0:1.44-512.2.el10_0.noarch",
"product": {
"name": "perl-File-Find-0:1.44-512.2.el10_0.noarch",
"product_id": "perl-File-Find-0:1.44-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-Find@1.44-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-File-stat-0:1.14-512.2.el10_0.noarch",
"product": {
"name": "perl-File-stat-0:1.14-512.2.el10_0.noarch",
"product_id": "perl-File-stat-0:1.14-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-File-stat@1.14-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-FileCache-0:1.10-512.2.el10_0.noarch",
"product": {
"name": "perl-FileCache-0:1.10-512.2.el10_0.noarch",
"product_id": "perl-FileCache-0:1.10-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-FileCache@1.10-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-FileHandle-0:2.05-512.2.el10_0.noarch",
"product": {
"name": "perl-FileHandle-0:2.05-512.2.el10_0.noarch",
"product_id": "perl-FileHandle-0:2.05-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-FileHandle@2.05-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-FindBin-0:1.54-512.2.el10_0.noarch",
"product": {
"name": "perl-FindBin-0:1.54-512.2.el10_0.noarch",
"product_id": "perl-FindBin-0:1.54-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-FindBin@1.54-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Getopt-Std-0:1.14-512.2.el10_0.noarch",
"product": {
"name": "perl-Getopt-Std-0:1.14-512.2.el10_0.noarch",
"product_id": "perl-Getopt-Std-0:1.14-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Getopt-Std@1.14-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-Collate-0:1.02-512.2.el10_0.noarch",
"product": {
"name": "perl-I18N-Collate-0:1.02-512.2.el10_0.noarch",
"product_id": "perl-I18N-Collate-0:1.02-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-Collate@1.02-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-I18N-LangTags-0:0.45-512.2.el10_0.noarch",
"product": {
"name": "perl-I18N-LangTags-0:0.45-512.2.el10_0.noarch",
"product_id": "perl-I18N-LangTags-0:0.45-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-I18N-LangTags@0.45-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-IPC-Open3-0:1.22-512.2.el10_0.noarch",
"product": {
"name": "perl-IPC-Open3-0:1.22-512.2.el10_0.noarch",
"product_id": "perl-IPC-Open3-0:1.22-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IPC-Open3@1.22-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Locale-Maketext-Simple-1:0.21-512.2.el10_0.noarch",
"product": {
"name": "perl-Locale-Maketext-Simple-1:0.21-512.2.el10_0.noarch",
"product_id": "perl-Locale-Maketext-Simple-1:0.21-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Locale-Maketext-Simple@0.21-512.2.el10_0?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "perl-Math-Complex-0:1.62-512.2.el10_0.noarch",
"product": {
"name": "perl-Math-Complex-0:1.62-512.2.el10_0.noarch",
"product_id": "perl-Math-Complex-0:1.62-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Math-Complex@1.62-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Memoize-0:1.16-512.2.el10_0.noarch",
"product": {
"name": "perl-Memoize-0:1.16-512.2.el10_0.noarch",
"product_id": "perl-Memoize-0:1.16-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Memoize@1.16-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Module-Loaded-1:0.08-512.2.el10_0.noarch",
"product": {
"name": "perl-Module-Loaded-1:0.08-512.2.el10_0.noarch",
"product_id": "perl-Module-Loaded-1:0.08-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Module-Loaded@0.08-512.2.el10_0?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "perl-NEXT-0:0.69-512.2.el10_0.noarch",
"product": {
"name": "perl-NEXT-0:0.69-512.2.el10_0.noarch",
"product_id": "perl-NEXT-0:0.69-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-NEXT@0.69-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Net-0:1.04-512.2.el10_0.noarch",
"product": {
"name": "perl-Net-0:1.04-512.2.el10_0.noarch",
"product_id": "perl-Net-0:1.04-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Net@1.04-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Pod-Functions-0:1.14-512.2.el10_0.noarch",
"product": {
"name": "perl-Pod-Functions-0:1.14-512.2.el10_0.noarch",
"product_id": "perl-Pod-Functions-0:1.14-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Pod-Functions@1.14-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Pod-Html-0:1.35-512.2.el10_0.noarch",
"product": {
"name": "perl-Pod-Html-0:1.35-512.2.el10_0.noarch",
"product_id": "perl-Pod-Html-0:1.35-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Pod-Html@1.35-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Safe-0:2.46-512.2.el10_0.noarch",
"product": {
"name": "perl-Safe-0:2.46-512.2.el10_0.noarch",
"product_id": "perl-Safe-0:2.46-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Safe@2.46-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Search-Dict-0:1.07-512.2.el10_0.noarch",
"product": {
"name": "perl-Search-Dict-0:1.07-512.2.el10_0.noarch",
"product_id": "perl-Search-Dict-0:1.07-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Search-Dict@1.07-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-SelectSaver-0:1.02-512.2.el10_0.noarch",
"product": {
"name": "perl-SelectSaver-0:1.02-512.2.el10_0.noarch",
"product_id": "perl-SelectSaver-0:1.02-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-SelectSaver@1.02-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-SelfLoader-0:1.27-512.2.el10_0.noarch",
"product": {
"name": "perl-SelfLoader-0:1.27-512.2.el10_0.noarch",
"product_id": "perl-SelfLoader-0:1.27-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-SelfLoader@1.27-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Symbol-0:1.09-512.2.el10_0.noarch",
"product": {
"name": "perl-Symbol-0:1.09-512.2.el10_0.noarch",
"product_id": "perl-Symbol-0:1.09-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Symbol@1.09-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Term-Complete-0:1.403-512.2.el10_0.noarch",
"product": {
"name": "perl-Term-Complete-0:1.403-512.2.el10_0.noarch",
"product_id": "perl-Term-Complete-0:1.403-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Term-Complete@1.403-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Term-ReadLine-0:1.17-512.2.el10_0.noarch",
"product": {
"name": "perl-Term-ReadLine-0:1.17-512.2.el10_0.noarch",
"product_id": "perl-Term-ReadLine-0:1.17-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Term-ReadLine@1.17-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Test-0:1.31-512.2.el10_0.noarch",
"product": {
"name": "perl-Test-0:1.31-512.2.el10_0.noarch",
"product_id": "perl-Test-0:1.31-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Test@1.31-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Text-Abbrev-0:1.02-512.2.el10_0.noarch",
"product": {
"name": "perl-Text-Abbrev-0:1.02-512.2.el10_0.noarch",
"product_id": "perl-Text-Abbrev-0:1.02-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Text-Abbrev@1.02-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Thread-0:3.05-512.2.el10_0.noarch",
"product": {
"name": "perl-Thread-0:3.05-512.2.el10_0.noarch",
"product_id": "perl-Thread-0:3.05-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Thread@3.05-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Thread-Semaphore-0:2.13-512.2.el10_0.noarch",
"product": {
"name": "perl-Thread-Semaphore-0:2.13-512.2.el10_0.noarch",
"product_id": "perl-Thread-Semaphore-0:2.13-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Thread-Semaphore@2.13-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Tie-0:4.6-512.2.el10_0.noarch",
"product": {
"name": "perl-Tie-0:4.6-512.2.el10_0.noarch",
"product_id": "perl-Tie-0:4.6-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Tie@4.6-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Tie-File-0:1.09-512.2.el10_0.noarch",
"product": {
"name": "perl-Tie-File-0:1.09-512.2.el10_0.noarch",
"product_id": "perl-Tie-File-0:1.09-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Tie-File@1.09-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Tie-Memoize-0:1.1-512.2.el10_0.noarch",
"product": {
"name": "perl-Tie-Memoize-0:1.1-512.2.el10_0.noarch",
"product_id": "perl-Tie-Memoize-0:1.1-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Tie-Memoize@1.1-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Time-0:1.04-512.2.el10_0.noarch",
"product": {
"name": "perl-Time-0:1.04-512.2.el10_0.noarch",
"product_id": "perl-Time-0:1.04-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time@1.04-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Unicode-UCD-0:0.78-512.2.el10_0.noarch",
"product": {
"name": "perl-Unicode-UCD-0:0.78-512.2.el10_0.noarch",
"product_id": "perl-Unicode-UCD-0:0.78-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Unicode-UCD@0.78-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-User-pwent-0:1.05-512.2.el10_0.noarch",
"product": {
"name": "perl-User-pwent-0:1.05-512.2.el10_0.noarch",
"product_id": "perl-User-pwent-0:1.05-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-User-pwent@1.05-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-autouse-0:1.11-512.2.el10_0.noarch",
"product": {
"name": "perl-autouse-0:1.11-512.2.el10_0.noarch",
"product_id": "perl-autouse-0:1.11-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-autouse@1.11-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-base-0:2.27-512.2.el10_0.noarch",
"product": {
"name": "perl-base-0:2.27-512.2.el10_0.noarch",
"product_id": "perl-base-0:2.27-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-base@2.27-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-blib-0:1.07-512.2.el10_0.noarch",
"product": {
"name": "perl-blib-0:1.07-512.2.el10_0.noarch",
"product_id": "perl-blib-0:1.07-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-blib@1.07-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-debugger-0:1.60-512.2.el10_0.noarch",
"product": {
"name": "perl-debugger-0:1.60-512.2.el10_0.noarch",
"product_id": "perl-debugger-0:1.60-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debugger@1.60-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-deprecate-0:0.04-512.2.el10_0.noarch",
"product": {
"name": "perl-deprecate-0:0.04-512.2.el10_0.noarch",
"product_id": "perl-deprecate-0:0.04-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-deprecate@0.04-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-diagnostics-0:1.40-512.2.el10_0.noarch",
"product": {
"name": "perl-diagnostics-0:1.40-512.2.el10_0.noarch",
"product_id": "perl-diagnostics-0:1.40-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-diagnostics@1.40-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-doc-0:5.40.2-512.2.el10_0.noarch",
"product": {
"name": "perl-doc-0:5.40.2-512.2.el10_0.noarch",
"product_id": "perl-doc-0:5.40.2-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-doc@5.40.2-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-encoding-warnings-0:0.14-512.2.el10_0.noarch",
"product": {
"name": "perl-encoding-warnings-0:0.14-512.2.el10_0.noarch",
"product_id": "perl-encoding-warnings-0:0.14-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-encoding-warnings@0.14-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-fields-0:2.27-512.2.el10_0.noarch",
"product": {
"name": "perl-fields-0:2.27-512.2.el10_0.noarch",
"product_id": "perl-fields-0:2.27-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-fields@2.27-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-filetest-0:1.03-512.2.el10_0.noarch",
"product": {
"name": "perl-filetest-0:1.03-512.2.el10_0.noarch",
"product_id": "perl-filetest-0:1.03-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-filetest@1.03-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-if-0:0.61.000-512.2.el10_0.noarch",
"product": {
"name": "perl-if-0:0.61.000-512.2.el10_0.noarch",
"product_id": "perl-if-0:0.61.000-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-if@0.61.000-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-less-0:0.03-512.2.el10_0.noarch",
"product": {
"name": "perl-less-0:0.03-512.2.el10_0.noarch",
"product_id": "perl-less-0:0.03-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-less@0.03-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-libnetcfg-4:5.40.2-512.2.el10_0.noarch",
"product": {
"name": "perl-libnetcfg-4:5.40.2-512.2.el10_0.noarch",
"product_id": "perl-libnetcfg-4:5.40.2-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libnetcfg@5.40.2-512.2.el10_0?arch=noarch\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-locale-0:1.12-512.2.el10_0.noarch",
"product": {
"name": "perl-locale-0:1.12-512.2.el10_0.noarch",
"product_id": "perl-locale-0:1.12-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-locale@1.12-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-macros-4:5.40.2-512.2.el10_0.noarch",
"product": {
"name": "perl-macros-4:5.40.2-512.2.el10_0.noarch",
"product_id": "perl-macros-4:5.40.2-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-macros@5.40.2-512.2.el10_0?arch=noarch\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-meta-notation-0:5.40.2-512.2.el10_0.noarch",
"product": {
"name": "perl-meta-notation-0:5.40.2-512.2.el10_0.noarch",
"product_id": "perl-meta-notation-0:5.40.2-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-meta-notation@5.40.2-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-open-0:1.13-512.2.el10_0.noarch",
"product": {
"name": "perl-open-0:1.13-512.2.el10_0.noarch",
"product_id": "perl-open-0:1.13-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-open@1.13-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-overload-0:1.37-512.2.el10_0.noarch",
"product": {
"name": "perl-overload-0:1.37-512.2.el10_0.noarch",
"product_id": "perl-overload-0:1.37-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-overload@1.37-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-overloading-0:0.02-512.2.el10_0.noarch",
"product": {
"name": "perl-overloading-0:0.02-512.2.el10_0.noarch",
"product_id": "perl-overloading-0:0.02-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-overloading@0.02-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-sigtrap-0:1.10-512.2.el10_0.noarch",
"product": {
"name": "perl-sigtrap-0:1.10-512.2.el10_0.noarch",
"product_id": "perl-sigtrap-0:1.10-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-sigtrap@1.10-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-sort-0:2.05-512.2.el10_0.noarch",
"product": {
"name": "perl-sort-0:2.05-512.2.el10_0.noarch",
"product_id": "perl-sort-0:2.05-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-sort@2.05-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-subs-0:1.04-512.2.el10_0.noarch",
"product": {
"name": "perl-subs-0:1.04-512.2.el10_0.noarch",
"product_id": "perl-subs-0:1.04-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-subs@1.04-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-utils-0:5.40.2-512.2.el10_0.noarch",
"product": {
"name": "perl-utils-0:5.40.2-512.2.el10_0.noarch",
"product_id": "perl-utils-0:5.40.2-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-utils@5.40.2-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-vars-0:1.05-512.2.el10_0.noarch",
"product": {
"name": "perl-vars-0:1.05-512.2.el10_0.noarch",
"product_id": "perl-vars-0:1.05-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-vars@1.05-512.2.el10_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-vmsish-0:1.04-512.2.el10_0.noarch",
"product": {
"name": "perl-vmsish-0:1.04-512.2.el10_0.noarch",
"product_id": "perl-vmsish-0:1.04-512.2.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-vmsish@1.04-512.2.el10_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.40.2-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.aarch64"
},
"product_reference": "perl-4:5.40.2-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.40.2-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.ppc64le"
},
"product_reference": "perl-4:5.40.2-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.40.2-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.s390x"
},
"product_reference": "perl-4:5.40.2-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.40.2-512.2.el10_0.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.src"
},
"product_reference": "perl-4:5.40.2-512.2.el10_0.src",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.40.2-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.x86_64"
},
"product_reference": "perl-4:5.40.2-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Attribute-Handlers-0:1.03-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Attribute-Handlers-0:1.03-512.2.el10_0.noarch"
},
"product_reference": "perl-Attribute-Handlers-0:1.03-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-AutoLoader-0:5.74-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-AutoLoader-0:5.74-512.2.el10_0.noarch"
},
"product_reference": "perl-AutoLoader-0:5.74-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-AutoSplit-0:5.74-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-AutoSplit-0:5.74-512.2.el10_0.noarch"
},
"product_reference": "perl-AutoSplit-0:5.74-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-0:1.89-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-B-0:1.89-512.2.el10_0.aarch64"
},
"product_reference": "perl-B-0:1.89-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-0:1.89-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-B-0:1.89-512.2.el10_0.ppc64le"
},
"product_reference": "perl-B-0:1.89-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-0:1.89-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-B-0:1.89-512.2.el10_0.s390x"
},
"product_reference": "perl-B-0:1.89-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-0:1.89-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-B-0:1.89-512.2.el10_0.x86_64"
},
"product_reference": "perl-B-0:1.89-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-debuginfo-0:1.89-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.2.el10_0.aarch64"
},
"product_reference": "perl-B-debuginfo-0:1.89-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-debuginfo-0:1.89-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.2.el10_0.ppc64le"
},
"product_reference": "perl-B-debuginfo-0:1.89-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-debuginfo-0:1.89-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.2.el10_0.s390x"
},
"product_reference": "perl-B-debuginfo-0:1.89-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-B-debuginfo-0:1.89-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.2.el10_0.x86_64"
},
"product_reference": "perl-B-debuginfo-0:1.89-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Benchmark-0:1.25-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Benchmark-0:1.25-512.2.el10_0.noarch"
},
"product_reference": "perl-Benchmark-0:1.25-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Class-Struct-0:0.68-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Class-Struct-0:0.68-512.2.el10_0.noarch"
},
"product_reference": "perl-Class-Struct-0:0.68-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Config-Extensions-0:0.03-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Config-Extensions-0:0.03-512.2.el10_0.noarch"
},
"product_reference": "perl-Config-Extensions-0:0.03-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-DBM_Filter-0:0.06-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-DBM_Filter-0:0.06-512.2.el10_0.noarch"
},
"product_reference": "perl-DBM_Filter-0:0.06-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-0:1.34-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.2.el10_0.aarch64"
},
"product_reference": "perl-Devel-Peek-0:1.34-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-0:1.34-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.2.el10_0.ppc64le"
},
"product_reference": "perl-Devel-Peek-0:1.34-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-0:1.34-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.2.el10_0.s390x"
},
"product_reference": "perl-Devel-Peek-0:1.34-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-0:1.34-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.2.el10_0.x86_64"
},
"product_reference": "perl-Devel-Peek-0:1.34-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.aarch64"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.ppc64le"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.s390x"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.x86_64"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-SelfStubber-0:1.06-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Devel-SelfStubber-0:1.06-512.2.el10_0.noarch"
},
"product_reference": "perl-Devel-SelfStubber-0:1.06-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-DirHandle-0:1.05-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-DirHandle-0:1.05-512.2.el10_0.noarch"
},
"product_reference": "perl-DirHandle-0:1.05-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Dumpvalue-0:2.27-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Dumpvalue-0:2.27-512.2.el10_0.noarch"
},
"product_reference": "perl-Dumpvalue-0:2.27-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-DynaLoader-0:1.56-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.2.el10_0.aarch64"
},
"product_reference": "perl-DynaLoader-0:1.56-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-DynaLoader-0:1.56-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.2.el10_0.ppc64le"
},
"product_reference": "perl-DynaLoader-0:1.56-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-DynaLoader-0:1.56-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.2.el10_0.s390x"
},
"product_reference": "perl-DynaLoader-0:1.56-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-DynaLoader-0:1.56-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.2.el10_0.x86_64"
},
"product_reference": "perl-DynaLoader-0:1.56-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-English-0:1.11-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-English-0:1.11-512.2.el10_0.noarch"
},
"product_reference": "perl-English-0:1.11-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Errno-0:1.38-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Errno-0:1.38-512.2.el10_0.aarch64"
},
"product_reference": "perl-Errno-0:1.38-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Errno-0:1.38-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Errno-0:1.38-512.2.el10_0.ppc64le"
},
"product_reference": "perl-Errno-0:1.38-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Errno-0:1.38-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Errno-0:1.38-512.2.el10_0.s390x"
},
"product_reference": "perl-Errno-0:1.38-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Errno-0:1.38-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Errno-0:1.38-512.2.el10_0.x86_64"
},
"product_reference": "perl-Errno-0:1.38-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ExtUtils-Constant-0:0.25-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-ExtUtils-Constant-0:0.25-512.2.el10_0.noarch"
},
"product_reference": "perl-ExtUtils-Constant-0:0.25-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ExtUtils-Embed-0:1.35-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-ExtUtils-Embed-0:1.35-512.2.el10_0.noarch"
},
"product_reference": "perl-ExtUtils-Embed-0:1.35-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ExtUtils-Miniperl-0:1.14-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-ExtUtils-Miniperl-0:1.14-512.2.el10_0.noarch"
},
"product_reference": "perl-ExtUtils-Miniperl-0:1.14-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-0:1.18-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Fcntl-0:1.18-512.2.el10_0.aarch64"
},
"product_reference": "perl-Fcntl-0:1.18-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-0:1.18-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Fcntl-0:1.18-512.2.el10_0.ppc64le"
},
"product_reference": "perl-Fcntl-0:1.18-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-0:1.18-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Fcntl-0:1.18-512.2.el10_0.s390x"
},
"product_reference": "perl-Fcntl-0:1.18-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-0:1.18-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Fcntl-0:1.18-512.2.el10_0.x86_64"
},
"product_reference": "perl-Fcntl-0:1.18-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.aarch64"
},
"product_reference": "perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.ppc64le"
},
"product_reference": "perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.s390x"
},
"product_reference": "perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.x86_64"
},
"product_reference": "perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-Basename-0:2.86-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-File-Basename-0:2.86-512.2.el10_0.noarch"
},
"product_reference": "perl-File-Basename-0:2.86-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-Compare-0:1.100.800-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-File-Compare-0:1.100.800-512.2.el10_0.noarch"
},
"product_reference": "perl-File-Compare-0:1.100.800-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-Copy-0:2.41-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-File-Copy-0:2.41-512.2.el10_0.noarch"
},
"product_reference": "perl-File-Copy-0:2.41-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-0:1.12-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.2.el10_0.aarch64"
},
"product_reference": "perl-File-DosGlob-0:1.12-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-0:1.12-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.2.el10_0.ppc64le"
},
"product_reference": "perl-File-DosGlob-0:1.12-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-0:1.12-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.2.el10_0.s390x"
},
"product_reference": "perl-File-DosGlob-0:1.12-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-0:1.12-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.2.el10_0.x86_64"
},
"product_reference": "perl-File-DosGlob-0:1.12-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.aarch64"
},
"product_reference": "perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.ppc64le"
},
"product_reference": "perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.s390x"
},
"product_reference": "perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.x86_64"
},
"product_reference": "perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-Find-0:1.44-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-File-Find-0:1.44-512.2.el10_0.noarch"
},
"product_reference": "perl-File-Find-0:1.44-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-File-stat-0:1.14-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-File-stat-0:1.14-512.2.el10_0.noarch"
},
"product_reference": "perl-File-stat-0:1.14-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-FileCache-0:1.10-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-FileCache-0:1.10-512.2.el10_0.noarch"
},
"product_reference": "perl-FileCache-0:1.10-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-FileHandle-0:2.05-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-FileHandle-0:2.05-512.2.el10_0.noarch"
},
"product_reference": "perl-FileHandle-0:2.05-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-FindBin-0:1.54-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-FindBin-0:1.54-512.2.el10_0.noarch"
},
"product_reference": "perl-FindBin-0:1.54-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-1:1.24-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.2.el10_0.aarch64"
},
"product_reference": "perl-GDBM_File-1:1.24-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-1:1.24-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.2.el10_0.ppc64le"
},
"product_reference": "perl-GDBM_File-1:1.24-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-1:1.24-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.2.el10_0.s390x"
},
"product_reference": "perl-GDBM_File-1:1.24-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-1:1.24-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.2.el10_0.x86_64"
},
"product_reference": "perl-GDBM_File-1:1.24-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.aarch64"
},
"product_reference": "perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.ppc64le"
},
"product_reference": "perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.s390x"
},
"product_reference": "perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.x86_64"
},
"product_reference": "perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Getopt-Std-0:1.14-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Getopt-Std-0:1.14-512.2.el10_0.noarch"
},
"product_reference": "perl-Getopt-Std-0:1.14-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-0:0.32-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.2.el10_0.aarch64"
},
"product_reference": "perl-Hash-Util-0:0.32-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-0:0.32-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.2.el10_0.ppc64le"
},
"product_reference": "perl-Hash-Util-0:0.32-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-0:0.32-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.2.el10_0.s390x"
},
"product_reference": "perl-Hash-Util-0:0.32-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-0:0.32-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.2.el10_0.x86_64"
},
"product_reference": "perl-Hash-Util-0:0.32-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.aarch64"
},
"product_reference": "perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.ppc64le"
},
"product_reference": "perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.s390x"
},
"product_reference": "perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.x86_64"
},
"product_reference": "perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.aarch64"
},
"product_reference": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.ppc64le"
},
"product_reference": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.s390x"
},
"product_reference": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.x86_64"
},
"product_reference": "perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.aarch64"
},
"product_reference": "perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.ppc64le"
},
"product_reference": "perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.s390x"
},
"product_reference": "perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.x86_64"
},
"product_reference": "perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Collate-0:1.02-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-I18N-Collate-0:1.02-512.2.el10_0.noarch"
},
"product_reference": "perl-I18N-Collate-0:1.02-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-LangTags-0:0.45-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-I18N-LangTags-0:0.45-512.2.el10_0.noarch"
},
"product_reference": "perl-I18N-LangTags-0:0.45-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-0:0.24-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.2.el10_0.aarch64"
},
"product_reference": "perl-I18N-Langinfo-0:0.24-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-0:0.24-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.2.el10_0.ppc64le"
},
"product_reference": "perl-I18N-Langinfo-0:0.24-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-0:0.24-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.2.el10_0.s390x"
},
"product_reference": "perl-I18N-Langinfo-0:0.24-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-0:0.24-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.2.el10_0.x86_64"
},
"product_reference": "perl-I18N-Langinfo-0:0.24-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.aarch64"
},
"product_reference": "perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.ppc64le"
},
"product_reference": "perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.s390x"
},
"product_reference": "perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.x86_64"
},
"product_reference": "perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-0:1.55-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-IO-0:1.55-512.2.el10_0.aarch64"
},
"product_reference": "perl-IO-0:1.55-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-0:1.55-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-IO-0:1.55-512.2.el10_0.ppc64le"
},
"product_reference": "perl-IO-0:1.55-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-0:1.55-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-IO-0:1.55-512.2.el10_0.s390x"
},
"product_reference": "perl-IO-0:1.55-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-0:1.55-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-IO-0:1.55-512.2.el10_0.x86_64"
},
"product_reference": "perl-IO-0:1.55-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.55-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.2.el10_0.aarch64"
},
"product_reference": "perl-IO-debuginfo-0:1.55-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.55-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.2.el10_0.ppc64le"
},
"product_reference": "perl-IO-debuginfo-0:1.55-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.55-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.2.el10_0.s390x"
},
"product_reference": "perl-IO-debuginfo-0:1.55-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.55-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.2.el10_0.x86_64"
},
"product_reference": "perl-IO-debuginfo-0:1.55-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IPC-Open3-0:1.22-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-IPC-Open3-0:1.22-512.2.el10_0.noarch"
},
"product_reference": "perl-IPC-Open3-0:1.22-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Locale-Maketext-Simple-1:0.21-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Locale-Maketext-Simple-1:0.21-512.2.el10_0.noarch"
},
"product_reference": "perl-Locale-Maketext-Simple-1:0.21-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Math-Complex-0:1.62-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Math-Complex-0:1.62-512.2.el10_0.noarch"
},
"product_reference": "perl-Math-Complex-0:1.62-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Memoize-0:1.16-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Memoize-0:1.16-512.2.el10_0.noarch"
},
"product_reference": "perl-Memoize-0:1.16-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Module-Loaded-1:0.08-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Module-Loaded-1:0.08-512.2.el10_0.noarch"
},
"product_reference": "perl-Module-Loaded-1:0.08-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-0:1.17-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.2.el10_0.aarch64"
},
"product_reference": "perl-NDBM_File-0:1.17-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-0:1.17-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.2.el10_0.ppc64le"
},
"product_reference": "perl-NDBM_File-0:1.17-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-0:1.17-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.2.el10_0.s390x"
},
"product_reference": "perl-NDBM_File-0:1.17-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-0:1.17-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.2.el10_0.x86_64"
},
"product_reference": "perl-NDBM_File-0:1.17-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.aarch64"
},
"product_reference": "perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.ppc64le"
},
"product_reference": "perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.s390x"
},
"product_reference": "perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.x86_64"
},
"product_reference": "perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-NEXT-0:0.69-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-NEXT-0:0.69-512.2.el10_0.noarch"
},
"product_reference": "perl-NEXT-0:0.69-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Net-0:1.04-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Net-0:1.04-512.2.el10_0.noarch"
},
"product_reference": "perl-Net-0:1.04-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-0:1.18-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.2.el10_0.aarch64"
},
"product_reference": "perl-ODBM_File-0:1.18-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-0:1.18-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.2.el10_0.ppc64le"
},
"product_reference": "perl-ODBM_File-0:1.18-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-0:1.18-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.2.el10_0.s390x"
},
"product_reference": "perl-ODBM_File-0:1.18-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-0:1.18-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.2.el10_0.x86_64"
},
"product_reference": "perl-ODBM_File-0:1.18-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.aarch64"
},
"product_reference": "perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.ppc64le"
},
"product_reference": "perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.s390x"
},
"product_reference": "perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.x86_64"
},
"product_reference": "perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-0:1.65-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Opcode-0:1.65-512.2.el10_0.aarch64"
},
"product_reference": "perl-Opcode-0:1.65-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-0:1.65-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Opcode-0:1.65-512.2.el10_0.ppc64le"
},
"product_reference": "perl-Opcode-0:1.65-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-0:1.65-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Opcode-0:1.65-512.2.el10_0.s390x"
},
"product_reference": "perl-Opcode-0:1.65-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-0:1.65-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Opcode-0:1.65-512.2.el10_0.x86_64"
},
"product_reference": "perl-Opcode-0:1.65-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-debuginfo-0:1.65-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.2.el10_0.aarch64"
},
"product_reference": "perl-Opcode-debuginfo-0:1.65-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-debuginfo-0:1.65-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.2.el10_0.ppc64le"
},
"product_reference": "perl-Opcode-debuginfo-0:1.65-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-debuginfo-0:1.65-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.2.el10_0.s390x"
},
"product_reference": "perl-Opcode-debuginfo-0:1.65-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Opcode-debuginfo-0:1.65-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.2.el10_0.x86_64"
},
"product_reference": "perl-Opcode-debuginfo-0:1.65-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-0:2.20-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-POSIX-0:2.20-512.2.el10_0.aarch64"
},
"product_reference": "perl-POSIX-0:2.20-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-0:2.20-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-POSIX-0:2.20-512.2.el10_0.ppc64le"
},
"product_reference": "perl-POSIX-0:2.20-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-0:2.20-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-POSIX-0:2.20-512.2.el10_0.s390x"
},
"product_reference": "perl-POSIX-0:2.20-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-0:2.20-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-POSIX-0:2.20-512.2.el10_0.x86_64"
},
"product_reference": "perl-POSIX-0:2.20-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-debuginfo-0:2.20-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.2.el10_0.aarch64"
},
"product_reference": "perl-POSIX-debuginfo-0:2.20-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-debuginfo-0:2.20-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.2.el10_0.ppc64le"
},
"product_reference": "perl-POSIX-debuginfo-0:2.20-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-debuginfo-0:2.20-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.2.el10_0.s390x"
},
"product_reference": "perl-POSIX-debuginfo-0:2.20-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-POSIX-debuginfo-0:2.20-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.2.el10_0.x86_64"
},
"product_reference": "perl-POSIX-debuginfo-0:2.20-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Pod-Functions-0:1.14-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Pod-Functions-0:1.14-512.2.el10_0.noarch"
},
"product_reference": "perl-Pod-Functions-0:1.14-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Pod-Html-0:1.35-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Pod-Html-0:1.35-512.2.el10_0.noarch"
},
"product_reference": "perl-Pod-Html-0:1.35-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Safe-0:2.46-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Safe-0:2.46-512.2.el10_0.noarch"
},
"product_reference": "perl-Safe-0:2.46-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Search-Dict-0:1.07-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Search-Dict-0:1.07-512.2.el10_0.noarch"
},
"product_reference": "perl-Search-Dict-0:1.07-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SelectSaver-0:1.02-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-SelectSaver-0:1.02-512.2.el10_0.noarch"
},
"product_reference": "perl-SelectSaver-0:1.02-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SelfLoader-0:1.27-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-SelfLoader-0:1.27-512.2.el10_0.noarch"
},
"product_reference": "perl-SelfLoader-0:1.27-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Symbol-0:1.09-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Symbol-0:1.09-512.2.el10_0.noarch"
},
"product_reference": "perl-Symbol-0:1.09-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-0:1.25-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.2.el10_0.aarch64"
},
"product_reference": "perl-Sys-Hostname-0:1.25-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-0:1.25-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.2.el10_0.ppc64le"
},
"product_reference": "perl-Sys-Hostname-0:1.25-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-0:1.25-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.2.el10_0.s390x"
},
"product_reference": "perl-Sys-Hostname-0:1.25-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-0:1.25-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.2.el10_0.x86_64"
},
"product_reference": "perl-Sys-Hostname-0:1.25-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.aarch64"
},
"product_reference": "perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.ppc64le"
},
"product_reference": "perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.s390x"
},
"product_reference": "perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.x86_64"
},
"product_reference": "perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Term-Complete-0:1.403-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Term-Complete-0:1.403-512.2.el10_0.noarch"
},
"product_reference": "perl-Term-Complete-0:1.403-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Term-ReadLine-0:1.17-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Term-ReadLine-0:1.17-512.2.el10_0.noarch"
},
"product_reference": "perl-Term-ReadLine-0:1.17-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Test-0:1.31-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Test-0:1.31-512.2.el10_0.noarch"
},
"product_reference": "perl-Test-0:1.31-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Text-Abbrev-0:1.02-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Text-Abbrev-0:1.02-512.2.el10_0.noarch"
},
"product_reference": "perl-Text-Abbrev-0:1.02-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Thread-0:3.05-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Thread-0:3.05-512.2.el10_0.noarch"
},
"product_reference": "perl-Thread-0:3.05-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Thread-Semaphore-0:2.13-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Thread-Semaphore-0:2.13-512.2.el10_0.noarch"
},
"product_reference": "perl-Thread-Semaphore-0:2.13-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Tie-0:4.6-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Tie-0:4.6-512.2.el10_0.noarch"
},
"product_reference": "perl-Tie-0:4.6-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Tie-File-0:1.09-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Tie-File-0:1.09-512.2.el10_0.noarch"
},
"product_reference": "perl-Tie-File-0:1.09-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Tie-Memoize-0:1.1-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Tie-Memoize-0:1.1-512.2.el10_0.noarch"
},
"product_reference": "perl-Tie-Memoize-0:1.1-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-0:1.04-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Time-0:1.04-512.2.el10_0.noarch"
},
"product_reference": "perl-Time-0:1.04-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-0:1.3401-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.2.el10_0.aarch64"
},
"product_reference": "perl-Time-Piece-0:1.3401-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-0:1.3401-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.2.el10_0.ppc64le"
},
"product_reference": "perl-Time-Piece-0:1.3401-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-0:1.3401-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.2.el10_0.s390x"
},
"product_reference": "perl-Time-Piece-0:1.3401-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-0:1.3401-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.2.el10_0.x86_64"
},
"product_reference": "perl-Time-Piece-0:1.3401-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.aarch64"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.ppc64le"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.s390x"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.x86_64"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Unicode-UCD-0:0.78-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-Unicode-UCD-0:0.78-512.2.el10_0.noarch"
},
"product_reference": "perl-Unicode-UCD-0:0.78-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-User-pwent-0:1.05-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-User-pwent-0:1.05-512.2.el10_0.noarch"
},
"product_reference": "perl-User-pwent-0:1.05-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-autouse-0:1.11-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-autouse-0:1.11-512.2.el10_0.noarch"
},
"product_reference": "perl-autouse-0:1.11-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-0:2.27-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-base-0:2.27-512.2.el10_0.noarch"
},
"product_reference": "perl-base-0:2.27-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-blib-0:1.07-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-blib-0:1.07-512.2.el10_0.noarch"
},
"product_reference": "perl-blib-0:1.07-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugger-0:1.60-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-debugger-0:1.60-512.2.el10_0.noarch"
},
"product_reference": "perl-debugger-0:1.60-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.40.2-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.2.el10_0.aarch64"
},
"product_reference": "perl-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.40.2-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.2.el10_0.ppc64le"
},
"product_reference": "perl-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.40.2-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.2.el10_0.s390x"
},
"product_reference": "perl-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.40.2-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.2.el10_0.x86_64"
},
"product_reference": "perl-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.40.2-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.2.el10_0.aarch64"
},
"product_reference": "perl-debugsource-4:5.40.2-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.40.2-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.2.el10_0.ppc64le"
},
"product_reference": "perl-debugsource-4:5.40.2-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.40.2-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.2.el10_0.s390x"
},
"product_reference": "perl-debugsource-4:5.40.2-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.40.2-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.2.el10_0.x86_64"
},
"product_reference": "perl-debugsource-4:5.40.2-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-deprecate-0:0.04-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-deprecate-0:0.04-512.2.el10_0.noarch"
},
"product_reference": "perl-deprecate-0:0.04-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.40.2-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-devel-4:5.40.2-512.2.el10_0.aarch64"
},
"product_reference": "perl-devel-4:5.40.2-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.40.2-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-devel-4:5.40.2-512.2.el10_0.ppc64le"
},
"product_reference": "perl-devel-4:5.40.2-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.40.2-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-devel-4:5.40.2-512.2.el10_0.s390x"
},
"product_reference": "perl-devel-4:5.40.2-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.40.2-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-devel-4:5.40.2-512.2.el10_0.x86_64"
},
"product_reference": "perl-devel-4:5.40.2-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-diagnostics-0:1.40-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-diagnostics-0:1.40-512.2.el10_0.noarch"
},
"product_reference": "perl-diagnostics-0:1.40-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-doc-0:5.40.2-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-doc-0:5.40.2-512.2.el10_0.noarch"
},
"product_reference": "perl-doc-0:5.40.2-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-encoding-warnings-0:0.14-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-encoding-warnings-0:0.14-512.2.el10_0.noarch"
},
"product_reference": "perl-encoding-warnings-0:0.14-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-fields-0:2.27-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-fields-0:2.27-512.2.el10_0.noarch"
},
"product_reference": "perl-fields-0:2.27-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-filetest-0:1.03-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-filetest-0:1.03-512.2.el10_0.noarch"
},
"product_reference": "perl-filetest-0:1.03-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-if-0:0.61.000-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-if-0:0.61.000-512.2.el10_0.noarch"
},
"product_reference": "perl-if-0:0.61.000-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-4:5.40.2-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.2.el10_0.aarch64"
},
"product_reference": "perl-interpreter-4:5.40.2-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-4:5.40.2-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.2.el10_0.ppc64le"
},
"product_reference": "perl-interpreter-4:5.40.2-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-4:5.40.2-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.2.el10_0.s390x"
},
"product_reference": "perl-interpreter-4:5.40.2-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-4:5.40.2-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.2.el10_0.x86_64"
},
"product_reference": "perl-interpreter-4:5.40.2-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.aarch64"
},
"product_reference": "perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.ppc64le"
},
"product_reference": "perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.s390x"
},
"product_reference": "perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.x86_64"
},
"product_reference": "perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-less-0:0.03-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-less-0:0.03-512.2.el10_0.noarch"
},
"product_reference": "perl-less-0:0.03-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-lib-0:0.65-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-lib-0:0.65-512.2.el10_0.aarch64"
},
"product_reference": "perl-lib-0:0.65-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-lib-0:0.65-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-lib-0:0.65-512.2.el10_0.ppc64le"
},
"product_reference": "perl-lib-0:0.65-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-lib-0:0.65-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-lib-0:0.65-512.2.el10_0.s390x"
},
"product_reference": "perl-lib-0:0.65-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-lib-0:0.65-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-lib-0:0.65-512.2.el10_0.x86_64"
},
"product_reference": "perl-lib-0:0.65-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libnetcfg-4:5.40.2-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-libnetcfg-4:5.40.2-512.2.el10_0.noarch"
},
"product_reference": "perl-libnetcfg-4:5.40.2-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.40.2-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-libs-4:5.40.2-512.2.el10_0.aarch64"
},
"product_reference": "perl-libs-4:5.40.2-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.40.2-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-libs-4:5.40.2-512.2.el10_0.ppc64le"
},
"product_reference": "perl-libs-4:5.40.2-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.40.2-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-libs-4:5.40.2-512.2.el10_0.s390x"
},
"product_reference": "perl-libs-4:5.40.2-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.40.2-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-libs-4:5.40.2-512.2.el10_0.x86_64"
},
"product_reference": "perl-libs-4:5.40.2-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.40.2-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.2.el10_0.aarch64"
},
"product_reference": "perl-libs-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.40.2-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.2.el10_0.ppc64le"
},
"product_reference": "perl-libs-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.40.2-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.2.el10_0.s390x"
},
"product_reference": "perl-libs-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.40.2-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.2.el10_0.x86_64"
},
"product_reference": "perl-libs-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-locale-0:1.12-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-locale-0:1.12-512.2.el10_0.noarch"
},
"product_reference": "perl-locale-0:1.12-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-macros-4:5.40.2-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-macros-4:5.40.2-512.2.el10_0.noarch"
},
"product_reference": "perl-macros-4:5.40.2-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-meta-notation-0:5.40.2-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-meta-notation-0:5.40.2-512.2.el10_0.noarch"
},
"product_reference": "perl-meta-notation-0:5.40.2-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-0:1.29-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-mro-0:1.29-512.2.el10_0.aarch64"
},
"product_reference": "perl-mro-0:1.29-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-0:1.29-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-mro-0:1.29-512.2.el10_0.ppc64le"
},
"product_reference": "perl-mro-0:1.29-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-0:1.29-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-mro-0:1.29-512.2.el10_0.s390x"
},
"product_reference": "perl-mro-0:1.29-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-0:1.29-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-mro-0:1.29-512.2.el10_0.x86_64"
},
"product_reference": "perl-mro-0:1.29-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-debuginfo-0:1.29-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.2.el10_0.aarch64"
},
"product_reference": "perl-mro-debuginfo-0:1.29-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-debuginfo-0:1.29-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.2.el10_0.ppc64le"
},
"product_reference": "perl-mro-debuginfo-0:1.29-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-debuginfo-0:1.29-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.2.el10_0.s390x"
},
"product_reference": "perl-mro-debuginfo-0:1.29-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-mro-debuginfo-0:1.29-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.2.el10_0.x86_64"
},
"product_reference": "perl-mro-debuginfo-0:1.29-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-open-0:1.13-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-open-0:1.13-512.2.el10_0.noarch"
},
"product_reference": "perl-open-0:1.13-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-overload-0:1.37-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-overload-0:1.37-512.2.el10_0.noarch"
},
"product_reference": "perl-overload-0:1.37-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-overloading-0:0.02-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-overloading-0:0.02-512.2.el10_0.noarch"
},
"product_reference": "perl-overloading-0:0.02-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ph-0:5.40.2-512.2.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-ph-0:5.40.2-512.2.el10_0.aarch64"
},
"product_reference": "perl-ph-0:5.40.2-512.2.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ph-0:5.40.2-512.2.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-ph-0:5.40.2-512.2.el10_0.ppc64le"
},
"product_reference": "perl-ph-0:5.40.2-512.2.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ph-0:5.40.2-512.2.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-ph-0:5.40.2-512.2.el10_0.s390x"
},
"product_reference": "perl-ph-0:5.40.2-512.2.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ph-0:5.40.2-512.2.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-ph-0:5.40.2-512.2.el10_0.x86_64"
},
"product_reference": "perl-ph-0:5.40.2-512.2.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-sigtrap-0:1.10-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-sigtrap-0:1.10-512.2.el10_0.noarch"
},
"product_reference": "perl-sigtrap-0:1.10-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-sort-0:2.05-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-sort-0:2.05-512.2.el10_0.noarch"
},
"product_reference": "perl-sort-0:2.05-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-subs-0:1.04-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-subs-0:1.04-512.2.el10_0.noarch"
},
"product_reference": "perl-subs-0:1.04-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-utils-0:5.40.2-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-utils-0:5.40.2-512.2.el10_0.noarch"
},
"product_reference": "perl-utils-0:5.40.2-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-vars-0:1.05-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-vars-0:1.05-512.2.el10_0.noarch"
},
"product_reference": "perl-vars-0:1.05-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-vmsish-0:1.04-512.2.el10_0.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:perl-vmsish-0:1.04-512.2.el10_0.noarch"
},
"product_reference": "perl-vmsish-0:1.04-512.2.el10_0.noarch",
"relates_to_product_reference": "AppStream-10.0.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-40909",
"cwe": {
"id": "CWE-426",
"name": "Untrusted Search Path"
},
"discovery_date": "2025-05-30T13:00:49.546076+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2369407"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "perl: Perl threads have a working directory race condition where file operations may target unintended paths",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to the successful exploitation of a CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027) or CWE-426: Untrusted Search Path vulnerability, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces least functionality by enabling only essential features, services, and ports to reduce the system\u2019s attack surface. Static code analysis, peer reviews, and robust input validation and error handling detect unsafe input that could affect execution timing or path resolution. Real-time threat detection, including IPS/IDS, antimalware, and continuous system monitoring, enables rapid identification of exploitation attempts. Process isolation reduces the likelihood of concurrent execution conflicts and contains any impact to isolated workloads. Executable search paths are restricted to trusted, explicitly defined directories, mitigating the risk of executing malicious files. These controls effectively lower the likelihood and impact of race conditions and untrusted path exploitation in the environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.src",
"AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Attribute-Handlers-0:1.03-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-AutoLoader-0:5.74-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-AutoSplit-0:5.74-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-B-0:1.89-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-B-0:1.89-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-B-0:1.89-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-B-0:1.89-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Benchmark-0:1.25-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Class-Struct-0:0.68-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Config-Extensions-0:0.03-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-DBM_Filter-0:0.06-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Devel-SelfStubber-0:1.06-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-DirHandle-0:1.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Dumpvalue-0:2.27-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-English-0:1.11-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Errno-0:1.38-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Errno-0:1.38-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Errno-0:1.38-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Errno-0:1.38-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-ExtUtils-Constant-0:0.25-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-ExtUtils-Embed-0:1.35-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-ExtUtils-Miniperl-0:1.14-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Fcntl-0:1.18-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Fcntl-0:1.18-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Fcntl-0:1.18-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Fcntl-0:1.18-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-File-Basename-0:2.86-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-File-Compare-0:1.100.800-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-File-Copy-0:2.41-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-File-Find-0:1.44-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-File-stat-0:1.14-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-FileCache-0:1.10-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-FileHandle-0:2.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-FindBin-0:1.54-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Getopt-Std-0:1.14-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-I18N-Collate-0:1.02-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-I18N-LangTags-0:0.45-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-IO-0:1.55-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-IO-0:1.55-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-IO-0:1.55-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-IO-0:1.55-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-IPC-Open3-0:1.22-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Locale-Maketext-Simple-1:0.21-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Math-Complex-0:1.62-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Memoize-0:1.16-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Module-Loaded-1:0.08-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-NEXT-0:0.69-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Net-0:1.04-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Opcode-0:1.65-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Opcode-0:1.65-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Opcode-0:1.65-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Opcode-0:1.65-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-POSIX-0:2.20-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-POSIX-0:2.20-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-POSIX-0:2.20-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-POSIX-0:2.20-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Pod-Functions-0:1.14-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Pod-Html-0:1.35-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Safe-0:2.46-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Search-Dict-0:1.07-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-SelectSaver-0:1.02-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-SelfLoader-0:1.27-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Symbol-0:1.09-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Term-Complete-0:1.403-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Term-ReadLine-0:1.17-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Test-0:1.31-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Text-Abbrev-0:1.02-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Thread-0:3.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Thread-Semaphore-0:2.13-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Tie-0:4.6-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Tie-File-0:1.09-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Tie-Memoize-0:1.1-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Time-0:1.04-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Unicode-UCD-0:0.78-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-User-pwent-0:1.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-autouse-0:1.11-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-base-0:2.27-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-blib-0:1.07-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-debugger-0:1.60-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-deprecate-0:0.04-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-devel-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-devel-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-devel-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-devel-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-diagnostics-0:1.40-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-doc-0:5.40.2-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-encoding-warnings-0:0.14-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-fields-0:2.27-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-filetest-0:1.03-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-if-0:0.61.000-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-less-0:0.03-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-lib-0:0.65-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-lib-0:0.65-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-lib-0:0.65-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-lib-0:0.65-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-libnetcfg-4:5.40.2-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-libs-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-libs-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-libs-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-libs-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-locale-0:1.12-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-macros-4:5.40.2-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-meta-notation-0:5.40.2-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-mro-0:1.29-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-mro-0:1.29-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-mro-0:1.29-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-mro-0:1.29-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-open-0:1.13-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-overload-0:1.37-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-overloading-0:0.02-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-ph-0:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-ph-0:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-ph-0:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-ph-0:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-sigtrap-0:1.10-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-sort-0:2.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-subs-0:1.04-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-utils-0:5.40.2-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-vars-0:1.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-vmsish-0:1.04-512.2.el10_0.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-40909"
},
{
"category": "external",
"summary": "RHBZ#2369407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369407"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-40909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40909"
},
{
"category": "external",
"summary": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226"
},
{
"category": "external",
"summary": "https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e",
"url": "https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e"
},
{
"category": "external",
"summary": "https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch",
"url": "https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch"
},
{
"category": "external",
"summary": "https://github.com/Perl/perl5/issues/10387",
"url": "https://github.com/Perl/perl5/issues/10387"
},
{
"category": "external",
"summary": "https://github.com/Perl/perl5/issues/23010",
"url": "https://github.com/Perl/perl5/issues/23010"
},
{
"category": "external",
"summary": "https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads",
"url": "https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/05/22/2",
"url": "https://www.openwall.com/lists/oss-security/2025/05/22/2"
}
],
"release_date": "2025-05-30T12:20:11.237000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-29T08:53:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.src",
"AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Attribute-Handlers-0:1.03-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-AutoLoader-0:5.74-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-AutoSplit-0:5.74-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-B-0:1.89-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-B-0:1.89-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-B-0:1.89-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-B-0:1.89-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Benchmark-0:1.25-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Class-Struct-0:0.68-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Config-Extensions-0:0.03-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-DBM_Filter-0:0.06-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Devel-SelfStubber-0:1.06-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-DirHandle-0:1.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Dumpvalue-0:2.27-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-English-0:1.11-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Errno-0:1.38-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Errno-0:1.38-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Errno-0:1.38-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Errno-0:1.38-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-ExtUtils-Constant-0:0.25-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-ExtUtils-Embed-0:1.35-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-ExtUtils-Miniperl-0:1.14-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Fcntl-0:1.18-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Fcntl-0:1.18-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Fcntl-0:1.18-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Fcntl-0:1.18-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-File-Basename-0:2.86-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-File-Compare-0:1.100.800-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-File-Copy-0:2.41-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-File-Find-0:1.44-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-File-stat-0:1.14-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-FileCache-0:1.10-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-FileHandle-0:2.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-FindBin-0:1.54-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Getopt-Std-0:1.14-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-I18N-Collate-0:1.02-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-I18N-LangTags-0:0.45-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-IO-0:1.55-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-IO-0:1.55-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-IO-0:1.55-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-IO-0:1.55-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-IPC-Open3-0:1.22-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Locale-Maketext-Simple-1:0.21-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Math-Complex-0:1.62-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Memoize-0:1.16-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Module-Loaded-1:0.08-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-NEXT-0:0.69-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Net-0:1.04-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Opcode-0:1.65-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Opcode-0:1.65-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Opcode-0:1.65-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Opcode-0:1.65-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-POSIX-0:2.20-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-POSIX-0:2.20-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-POSIX-0:2.20-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-POSIX-0:2.20-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Pod-Functions-0:1.14-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Pod-Html-0:1.35-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Safe-0:2.46-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Search-Dict-0:1.07-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-SelectSaver-0:1.02-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-SelfLoader-0:1.27-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Symbol-0:1.09-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Term-Complete-0:1.403-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Term-ReadLine-0:1.17-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Test-0:1.31-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Text-Abbrev-0:1.02-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Thread-0:3.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Thread-Semaphore-0:2.13-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Tie-0:4.6-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Tie-File-0:1.09-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Tie-Memoize-0:1.1-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Time-0:1.04-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Unicode-UCD-0:0.78-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-User-pwent-0:1.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-autouse-0:1.11-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-base-0:2.27-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-blib-0:1.07-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-debugger-0:1.60-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-deprecate-0:0.04-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-devel-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-devel-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-devel-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-devel-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-diagnostics-0:1.40-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-doc-0:5.40.2-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-encoding-warnings-0:0.14-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-fields-0:2.27-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-filetest-0:1.03-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-if-0:0.61.000-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-less-0:0.03-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-lib-0:0.65-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-lib-0:0.65-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-lib-0:0.65-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-lib-0:0.65-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-libnetcfg-4:5.40.2-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-libs-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-libs-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-libs-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-libs-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-locale-0:1.12-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-macros-4:5.40.2-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-meta-notation-0:5.40.2-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-mro-0:1.29-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-mro-0:1.29-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-mro-0:1.29-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-mro-0:1.29-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-open-0:1.13-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-overload-0:1.37-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-overloading-0:0.02-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-ph-0:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-ph-0:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-ph-0:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-ph-0:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-sigtrap-0:1.10-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-sort-0:2.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-subs-0:1.04-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-utils-0:5.40.2-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-vars-0:1.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-vmsish-0:1.04-512.2.el10_0.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12056"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.src",
"AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Attribute-Handlers-0:1.03-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-AutoLoader-0:5.74-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-AutoSplit-0:5.74-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-B-0:1.89-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-B-0:1.89-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-B-0:1.89-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-B-0:1.89-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Benchmark-0:1.25-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Class-Struct-0:0.68-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Config-Extensions-0:0.03-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-DBM_Filter-0:0.06-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Devel-SelfStubber-0:1.06-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-DirHandle-0:1.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Dumpvalue-0:2.27-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-English-0:1.11-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Errno-0:1.38-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Errno-0:1.38-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Errno-0:1.38-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Errno-0:1.38-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-ExtUtils-Constant-0:0.25-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-ExtUtils-Embed-0:1.35-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-ExtUtils-Miniperl-0:1.14-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Fcntl-0:1.18-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Fcntl-0:1.18-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Fcntl-0:1.18-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Fcntl-0:1.18-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-File-Basename-0:2.86-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-File-Compare-0:1.100.800-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-File-Copy-0:2.41-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-File-Find-0:1.44-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-File-stat-0:1.14-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-FileCache-0:1.10-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-FileHandle-0:2.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-FindBin-0:1.54-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Getopt-Std-0:1.14-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-I18N-Collate-0:1.02-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-I18N-LangTags-0:0.45-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-IO-0:1.55-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-IO-0:1.55-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-IO-0:1.55-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-IO-0:1.55-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-IPC-Open3-0:1.22-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Locale-Maketext-Simple-1:0.21-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Math-Complex-0:1.62-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Memoize-0:1.16-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Module-Loaded-1:0.08-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-NEXT-0:0.69-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Net-0:1.04-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Opcode-0:1.65-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Opcode-0:1.65-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Opcode-0:1.65-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Opcode-0:1.65-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-POSIX-0:2.20-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-POSIX-0:2.20-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-POSIX-0:2.20-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-POSIX-0:2.20-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Pod-Functions-0:1.14-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Pod-Html-0:1.35-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Safe-0:2.46-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Search-Dict-0:1.07-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-SelectSaver-0:1.02-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-SelfLoader-0:1.27-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Symbol-0:1.09-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Term-Complete-0:1.403-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Term-ReadLine-0:1.17-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Test-0:1.31-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Text-Abbrev-0:1.02-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Thread-0:3.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Thread-Semaphore-0:2.13-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Tie-0:4.6-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Tie-File-0:1.09-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Tie-Memoize-0:1.1-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Time-0:1.04-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Unicode-UCD-0:0.78-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-User-pwent-0:1.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-autouse-0:1.11-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-base-0:2.27-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-blib-0:1.07-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-debugger-0:1.60-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-deprecate-0:0.04-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-devel-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-devel-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-devel-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-devel-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-diagnostics-0:1.40-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-doc-0:5.40.2-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-encoding-warnings-0:0.14-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-fields-0:2.27-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-filetest-0:1.03-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-if-0:0.61.000-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-less-0:0.03-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-lib-0:0.65-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-lib-0:0.65-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-lib-0:0.65-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-lib-0:0.65-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-libnetcfg-4:5.40.2-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-libs-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-libs-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-libs-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-libs-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-locale-0:1.12-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-macros-4:5.40.2-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-meta-notation-0:5.40.2-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-mro-0:1.29-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-mro-0:1.29-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-mro-0:1.29-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-mro-0:1.29-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-open-0:1.13-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-overload-0:1.37-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-overloading-0:0.02-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-ph-0:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-ph-0:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-ph-0:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-ph-0:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-sigtrap-0:1.10-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-sort-0:2.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-subs-0:1.04-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-utils-0:5.40.2-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-vars-0:1.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-vmsish-0:1.04-512.2.el10_0.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.src",
"AppStream-10.0.Z:perl-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Attribute-Handlers-0:1.03-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-AutoLoader-0:5.74-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-AutoSplit-0:5.74-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-B-0:1.89-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-B-0:1.89-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-B-0:1.89-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-B-0:1.89-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-B-debuginfo-0:1.89-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Benchmark-0:1.25-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Class-Struct-0:0.68-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Config-Extensions-0:0.03-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-DBM_Filter-0:0.06-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Devel-Peek-0:1.34-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Devel-Peek-debuginfo-0:1.34-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Devel-SelfStubber-0:1.06-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-DirHandle-0:1.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Dumpvalue-0:2.27-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-DynaLoader-0:1.56-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-English-0:1.11-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Errno-0:1.38-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Errno-0:1.38-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Errno-0:1.38-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Errno-0:1.38-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-ExtUtils-Constant-0:0.25-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-ExtUtils-Embed-0:1.35-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-ExtUtils-Miniperl-0:1.14-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Fcntl-0:1.18-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Fcntl-0:1.18-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Fcntl-0:1.18-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Fcntl-0:1.18-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Fcntl-debuginfo-0:1.18-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-File-Basename-0:2.86-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-File-Compare-0:1.100.800-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-File-Copy-0:2.41-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-File-DosGlob-0:1.12-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-File-DosGlob-debuginfo-0:1.12-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-File-Find-0:1.44-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-File-stat-0:1.14-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-FileCache-0:1.10-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-FileHandle-0:2.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-FindBin-0:1.54-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-GDBM_File-1:1.24-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-GDBM_File-debuginfo-1:1.24-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Getopt-Std-0:1.14-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Hash-Util-0:0.32-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-0:1.27-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Hash-Util-FieldHash-debuginfo-0:1.27-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Hash-Util-debuginfo-0:0.32-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-I18N-Collate-0:1.02-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-I18N-LangTags-0:0.45-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-I18N-Langinfo-0:0.24-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-I18N-Langinfo-debuginfo-0:0.24-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-IO-0:1.55-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-IO-0:1.55-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-IO-0:1.55-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-IO-0:1.55-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-IO-debuginfo-0:1.55-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-IPC-Open3-0:1.22-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Locale-Maketext-Simple-1:0.21-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Math-Complex-0:1.62-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Memoize-0:1.16-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Module-Loaded-1:0.08-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-NDBM_File-0:1.17-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-NDBM_File-debuginfo-0:1.17-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-NEXT-0:0.69-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Net-0:1.04-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-ODBM_File-0:1.18-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-ODBM_File-debuginfo-0:1.18-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Opcode-0:1.65-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Opcode-0:1.65-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Opcode-0:1.65-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Opcode-0:1.65-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Opcode-debuginfo-0:1.65-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-POSIX-0:2.20-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-POSIX-0:2.20-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-POSIX-0:2.20-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-POSIX-0:2.20-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-POSIX-debuginfo-0:2.20-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Pod-Functions-0:1.14-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Pod-Html-0:1.35-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Safe-0:2.46-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Search-Dict-0:1.07-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-SelectSaver-0:1.02-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-SelfLoader-0:1.27-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Symbol-0:1.09-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Sys-Hostname-0:1.25-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Sys-Hostname-debuginfo-0:1.25-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Term-Complete-0:1.403-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Term-ReadLine-0:1.17-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Test-0:1.31-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Text-Abbrev-0:1.02-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Thread-0:3.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Thread-Semaphore-0:2.13-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Tie-0:4.6-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Tie-File-0:1.09-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Tie-Memoize-0:1.1-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Time-0:1.04-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Time-Piece-0:1.3401-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-Time-Piece-debuginfo-0:1.3401-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-Unicode-UCD-0:0.78-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-User-pwent-0:1.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-autouse-0:1.11-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-base-0:2.27-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-blib-0:1.07-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-debugger-0:1.60-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-debugsource-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-deprecate-0:0.04-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-devel-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-devel-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-devel-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-devel-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-diagnostics-0:1.40-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-doc-0:5.40.2-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-encoding-warnings-0:0.14-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-fields-0:2.27-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-filetest-0:1.03-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-if-0:0.61.000-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-interpreter-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-interpreter-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-less-0:0.03-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-lib-0:0.65-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-lib-0:0.65-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-lib-0:0.65-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-lib-0:0.65-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-libnetcfg-4:5.40.2-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-libs-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-libs-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-libs-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-libs-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-libs-debuginfo-4:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-locale-0:1.12-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-macros-4:5.40.2-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-meta-notation-0:5.40.2-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-mro-0:1.29-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-mro-0:1.29-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-mro-0:1.29-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-mro-0:1.29-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-mro-debuginfo-0:1.29-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-open-0:1.13-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-overload-0:1.37-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-overloading-0:0.02-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-ph-0:5.40.2-512.2.el10_0.aarch64",
"AppStream-10.0.Z:perl-ph-0:5.40.2-512.2.el10_0.ppc64le",
"AppStream-10.0.Z:perl-ph-0:5.40.2-512.2.el10_0.s390x",
"AppStream-10.0.Z:perl-ph-0:5.40.2-512.2.el10_0.x86_64",
"AppStream-10.0.Z:perl-sigtrap-0:1.10-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-sort-0:2.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-subs-0:1.04-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-utils-0:5.40.2-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-vars-0:1.05-512.2.el10_0.noarch",
"AppStream-10.0.Z:perl-vmsish-0:1.04-512.2.el10_0.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "perl: Perl threads have a working directory race condition where file operations may target unintended paths"
}
]
}
rhsa-2025:11805
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for perl is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Perl is a high-level programming language that is commonly used for system administration utilities and web programming.\n\nSecurity Fix(es):\n\n* perl: Perl threads have a working directory race condition where file operations may target unintended paths (CVE-2025-40909)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:11805",
"url": "https://access.redhat.com/errata/RHSA-2025:11805"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2369407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369407"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_11805.json"
}
],
"title": "Red Hat Security Advisory: perl security update",
"tracking": {
"current_release_date": "2025-11-06T23:14:34+00:00",
"generator": {
"date": "2025-11-06T23:14:34+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.11"
}
},
"id": "RHSA-2025:11805",
"initial_release_date": "2025-07-28T02:24:30+00:00",
"revision_history": [
{
"date": "2025-07-28T02:24:30+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-28T02:24:30+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-06T23:14:34+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-4:5.26.3-423.el8_10.aarch64",
"product": {
"name": "perl-4:5.26.3-423.el8_10.aarch64",
"product_id": "perl-4:5.26.3-423.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl@5.26.3-423.el8_10?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-0:1.26-423.el8_10.aarch64",
"product": {
"name": "perl-Devel-Peek-0:1.26-423.el8_10.aarch64",
"product_id": "perl-Devel-Peek-0:1.26-423.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek@1.26-423.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-0:1.31-423.el8_10.aarch64",
"product": {
"name": "perl-Time-Piece-0:1.31-423.el8_10.aarch64",
"product_id": "perl-Time-Piece-0:1.31-423.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece@1.31-423.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-devel-4:5.26.3-423.el8_10.aarch64",
"product": {
"name": "perl-devel-4:5.26.3-423.el8_10.aarch64",
"product_id": "perl-devel-4:5.26.3-423.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-devel@5.26.3-423.el8_10?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-tests-4:5.26.3-423.el8_10.aarch64",
"product": {
"name": "perl-tests-4:5.26.3-423.el8_10.aarch64",
"product_id": "perl-tests-4:5.26.3-423.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-tests@5.26.3-423.el8_10?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-debugsource-4:5.26.3-423.el8_10.aarch64",
"product": {
"name": "perl-debugsource-4:5.26.3-423.el8_10.aarch64",
"product_id": "perl-debugsource-4:5.26.3-423.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debugsource@5.26.3-423.el8_10?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.aarch64",
"product": {
"name": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.aarch64",
"product_id": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek-debuginfo@1.26-423.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-IO-debuginfo-0:1.38-423.el8_10.aarch64",
"product": {
"name": "perl-IO-debuginfo-0:1.38-423.el8_10.aarch64",
"product_id": "perl-IO-debuginfo-0:1.38-423.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO-debuginfo@1.38-423.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.aarch64",
"product": {
"name": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.aarch64",
"product_id": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece-debuginfo@1.31-423.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-debuginfo-4:5.26.3-423.el8_10.aarch64",
"product": {
"name": "perl-debuginfo-4:5.26.3-423.el8_10.aarch64",
"product_id": "perl-debuginfo-4:5.26.3-423.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debuginfo@5.26.3-423.el8_10?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.aarch64",
"product": {
"name": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.aarch64",
"product_id": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter-debuginfo@5.26.3-423.el8_10?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-debuginfo-4:5.26.3-423.el8_10.aarch64",
"product": {
"name": "perl-libs-debuginfo-4:5.26.3-423.el8_10.aarch64",
"product_id": "perl-libs-debuginfo-4:5.26.3-423.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs-debuginfo@5.26.3-423.el8_10?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-Errno-0:1.28-423.el8_10.aarch64",
"product": {
"name": "perl-Errno-0:1.28-423.el8_10.aarch64",
"product_id": "perl-Errno-0:1.28-423.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Errno@1.28-423.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-IO-0:1.38-423.el8_10.aarch64",
"product": {
"name": "perl-IO-0:1.38-423.el8_10.aarch64",
"product_id": "perl-IO-0:1.38-423.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO@1.38-423.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-4:5.26.3-423.el8_10.aarch64",
"product": {
"name": "perl-interpreter-4:5.26.3-423.el8_10.aarch64",
"product_id": "perl-interpreter-4:5.26.3-423.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter@5.26.3-423.el8_10?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-4:5.26.3-423.el8_10.aarch64",
"product": {
"name": "perl-libs-4:5.26.3-423.el8_10.aarch64",
"product_id": "perl-libs-4:5.26.3-423.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs@5.26.3-423.el8_10?arch=aarch64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-macros-4:5.26.3-423.el8_10.aarch64",
"product": {
"name": "perl-macros-4:5.26.3-423.el8_10.aarch64",
"product_id": "perl-macros-4:5.26.3-423.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-macros@5.26.3-423.el8_10?arch=aarch64\u0026epoch=4"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-4:5.26.3-423.el8_10.ppc64le",
"product": {
"name": "perl-4:5.26.3-423.el8_10.ppc64le",
"product_id": "perl-4:5.26.3-423.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl@5.26.3-423.el8_10?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-0:1.26-423.el8_10.ppc64le",
"product": {
"name": "perl-Devel-Peek-0:1.26-423.el8_10.ppc64le",
"product_id": "perl-Devel-Peek-0:1.26-423.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek@1.26-423.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-0:1.31-423.el8_10.ppc64le",
"product": {
"name": "perl-Time-Piece-0:1.31-423.el8_10.ppc64le",
"product_id": "perl-Time-Piece-0:1.31-423.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece@1.31-423.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-devel-4:5.26.3-423.el8_10.ppc64le",
"product": {
"name": "perl-devel-4:5.26.3-423.el8_10.ppc64le",
"product_id": "perl-devel-4:5.26.3-423.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-devel@5.26.3-423.el8_10?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-tests-4:5.26.3-423.el8_10.ppc64le",
"product": {
"name": "perl-tests-4:5.26.3-423.el8_10.ppc64le",
"product_id": "perl-tests-4:5.26.3-423.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-tests@5.26.3-423.el8_10?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-debugsource-4:5.26.3-423.el8_10.ppc64le",
"product": {
"name": "perl-debugsource-4:5.26.3-423.el8_10.ppc64le",
"product_id": "perl-debugsource-4:5.26.3-423.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debugsource@5.26.3-423.el8_10?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.ppc64le",
"product": {
"name": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.ppc64le",
"product_id": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek-debuginfo@1.26-423.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-IO-debuginfo-0:1.38-423.el8_10.ppc64le",
"product": {
"name": "perl-IO-debuginfo-0:1.38-423.el8_10.ppc64le",
"product_id": "perl-IO-debuginfo-0:1.38-423.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO-debuginfo@1.38-423.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.ppc64le",
"product": {
"name": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.ppc64le",
"product_id": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece-debuginfo@1.31-423.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"product": {
"name": "perl-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"product_id": "perl-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debuginfo@5.26.3-423.el8_10?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"product": {
"name": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"product_id": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter-debuginfo@5.26.3-423.el8_10?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"product": {
"name": "perl-libs-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"product_id": "perl-libs-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs-debuginfo@5.26.3-423.el8_10?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-Errno-0:1.28-423.el8_10.ppc64le",
"product": {
"name": "perl-Errno-0:1.28-423.el8_10.ppc64le",
"product_id": "perl-Errno-0:1.28-423.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Errno@1.28-423.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-IO-0:1.38-423.el8_10.ppc64le",
"product": {
"name": "perl-IO-0:1.38-423.el8_10.ppc64le",
"product_id": "perl-IO-0:1.38-423.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO@1.38-423.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-4:5.26.3-423.el8_10.ppc64le",
"product": {
"name": "perl-interpreter-4:5.26.3-423.el8_10.ppc64le",
"product_id": "perl-interpreter-4:5.26.3-423.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter@5.26.3-423.el8_10?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-4:5.26.3-423.el8_10.ppc64le",
"product": {
"name": "perl-libs-4:5.26.3-423.el8_10.ppc64le",
"product_id": "perl-libs-4:5.26.3-423.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs@5.26.3-423.el8_10?arch=ppc64le\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-macros-4:5.26.3-423.el8_10.ppc64le",
"product": {
"name": "perl-macros-4:5.26.3-423.el8_10.ppc64le",
"product_id": "perl-macros-4:5.26.3-423.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-macros@5.26.3-423.el8_10?arch=ppc64le\u0026epoch=4"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-4:5.26.3-423.el8_10.x86_64",
"product": {
"name": "perl-4:5.26.3-423.el8_10.x86_64",
"product_id": "perl-4:5.26.3-423.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl@5.26.3-423.el8_10?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-0:1.26-423.el8_10.x86_64",
"product": {
"name": "perl-Devel-Peek-0:1.26-423.el8_10.x86_64",
"product_id": "perl-Devel-Peek-0:1.26-423.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek@1.26-423.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-0:1.31-423.el8_10.x86_64",
"product": {
"name": "perl-Time-Piece-0:1.31-423.el8_10.x86_64",
"product_id": "perl-Time-Piece-0:1.31-423.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece@1.31-423.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-devel-4:5.26.3-423.el8_10.x86_64",
"product": {
"name": "perl-devel-4:5.26.3-423.el8_10.x86_64",
"product_id": "perl-devel-4:5.26.3-423.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-devel@5.26.3-423.el8_10?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-tests-4:5.26.3-423.el8_10.x86_64",
"product": {
"name": "perl-tests-4:5.26.3-423.el8_10.x86_64",
"product_id": "perl-tests-4:5.26.3-423.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-tests@5.26.3-423.el8_10?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-debugsource-4:5.26.3-423.el8_10.x86_64",
"product": {
"name": "perl-debugsource-4:5.26.3-423.el8_10.x86_64",
"product_id": "perl-debugsource-4:5.26.3-423.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debugsource@5.26.3-423.el8_10?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.x86_64",
"product": {
"name": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.x86_64",
"product_id": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek-debuginfo@1.26-423.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-IO-debuginfo-0:1.38-423.el8_10.x86_64",
"product": {
"name": "perl-IO-debuginfo-0:1.38-423.el8_10.x86_64",
"product_id": "perl-IO-debuginfo-0:1.38-423.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO-debuginfo@1.38-423.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.x86_64",
"product": {
"name": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.x86_64",
"product_id": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece-debuginfo@1.31-423.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-debuginfo-4:5.26.3-423.el8_10.x86_64",
"product": {
"name": "perl-debuginfo-4:5.26.3-423.el8_10.x86_64",
"product_id": "perl-debuginfo-4:5.26.3-423.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debuginfo@5.26.3-423.el8_10?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.x86_64",
"product": {
"name": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.x86_64",
"product_id": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter-debuginfo@5.26.3-423.el8_10?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-debuginfo-4:5.26.3-423.el8_10.x86_64",
"product": {
"name": "perl-libs-debuginfo-4:5.26.3-423.el8_10.x86_64",
"product_id": "perl-libs-debuginfo-4:5.26.3-423.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs-debuginfo@5.26.3-423.el8_10?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-Errno-0:1.28-423.el8_10.x86_64",
"product": {
"name": "perl-Errno-0:1.28-423.el8_10.x86_64",
"product_id": "perl-Errno-0:1.28-423.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Errno@1.28-423.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-IO-0:1.38-423.el8_10.x86_64",
"product": {
"name": "perl-IO-0:1.38-423.el8_10.x86_64",
"product_id": "perl-IO-0:1.38-423.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO@1.38-423.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-4:5.26.3-423.el8_10.x86_64",
"product": {
"name": "perl-interpreter-4:5.26.3-423.el8_10.x86_64",
"product_id": "perl-interpreter-4:5.26.3-423.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter@5.26.3-423.el8_10?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-4:5.26.3-423.el8_10.x86_64",
"product": {
"name": "perl-libs-4:5.26.3-423.el8_10.x86_64",
"product_id": "perl-libs-4:5.26.3-423.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs@5.26.3-423.el8_10?arch=x86_64\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-macros-4:5.26.3-423.el8_10.x86_64",
"product": {
"name": "perl-macros-4:5.26.3-423.el8_10.x86_64",
"product_id": "perl-macros-4:5.26.3-423.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-macros@5.26.3-423.el8_10?arch=x86_64\u0026epoch=4"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-devel-4:5.26.3-423.el8_10.i686",
"product": {
"name": "perl-devel-4:5.26.3-423.el8_10.i686",
"product_id": "perl-devel-4:5.26.3-423.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-devel@5.26.3-423.el8_10?arch=i686\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-debugsource-4:5.26.3-423.el8_10.i686",
"product": {
"name": "perl-debugsource-4:5.26.3-423.el8_10.i686",
"product_id": "perl-debugsource-4:5.26.3-423.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debugsource@5.26.3-423.el8_10?arch=i686\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.i686",
"product": {
"name": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.i686",
"product_id": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek-debuginfo@1.26-423.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-IO-debuginfo-0:1.38-423.el8_10.i686",
"product": {
"name": "perl-IO-debuginfo-0:1.38-423.el8_10.i686",
"product_id": "perl-IO-debuginfo-0:1.38-423.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO-debuginfo@1.38-423.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.i686",
"product": {
"name": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.i686",
"product_id": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece-debuginfo@1.31-423.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "perl-debuginfo-4:5.26.3-423.el8_10.i686",
"product": {
"name": "perl-debuginfo-4:5.26.3-423.el8_10.i686",
"product_id": "perl-debuginfo-4:5.26.3-423.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debuginfo@5.26.3-423.el8_10?arch=i686\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.i686",
"product": {
"name": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.i686",
"product_id": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter-debuginfo@5.26.3-423.el8_10?arch=i686\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-debuginfo-4:5.26.3-423.el8_10.i686",
"product": {
"name": "perl-libs-debuginfo-4:5.26.3-423.el8_10.i686",
"product_id": "perl-libs-debuginfo-4:5.26.3-423.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs-debuginfo@5.26.3-423.el8_10?arch=i686\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-4:5.26.3-423.el8_10.i686",
"product": {
"name": "perl-libs-4:5.26.3-423.el8_10.i686",
"product_id": "perl-libs-4:5.26.3-423.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs@5.26.3-423.el8_10?arch=i686\u0026epoch=4"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-4:5.26.3-423.el8_10.s390x",
"product": {
"name": "perl-4:5.26.3-423.el8_10.s390x",
"product_id": "perl-4:5.26.3-423.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl@5.26.3-423.el8_10?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-0:1.26-423.el8_10.s390x",
"product": {
"name": "perl-Devel-Peek-0:1.26-423.el8_10.s390x",
"product_id": "perl-Devel-Peek-0:1.26-423.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek@1.26-423.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-0:1.31-423.el8_10.s390x",
"product": {
"name": "perl-Time-Piece-0:1.31-423.el8_10.s390x",
"product_id": "perl-Time-Piece-0:1.31-423.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece@1.31-423.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-devel-4:5.26.3-423.el8_10.s390x",
"product": {
"name": "perl-devel-4:5.26.3-423.el8_10.s390x",
"product_id": "perl-devel-4:5.26.3-423.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-devel@5.26.3-423.el8_10?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-tests-4:5.26.3-423.el8_10.s390x",
"product": {
"name": "perl-tests-4:5.26.3-423.el8_10.s390x",
"product_id": "perl-tests-4:5.26.3-423.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-tests@5.26.3-423.el8_10?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-debugsource-4:5.26.3-423.el8_10.s390x",
"product": {
"name": "perl-debugsource-4:5.26.3-423.el8_10.s390x",
"product_id": "perl-debugsource-4:5.26.3-423.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debugsource@5.26.3-423.el8_10?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.s390x",
"product": {
"name": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.s390x",
"product_id": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-Peek-debuginfo@1.26-423.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-IO-debuginfo-0:1.38-423.el8_10.s390x",
"product": {
"name": "perl-IO-debuginfo-0:1.38-423.el8_10.s390x",
"product_id": "perl-IO-debuginfo-0:1.38-423.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO-debuginfo@1.38-423.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.s390x",
"product": {
"name": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.s390x",
"product_id": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Time-Piece-debuginfo@1.31-423.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-debuginfo-4:5.26.3-423.el8_10.s390x",
"product": {
"name": "perl-debuginfo-4:5.26.3-423.el8_10.s390x",
"product_id": "perl-debuginfo-4:5.26.3-423.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-debuginfo@5.26.3-423.el8_10?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.s390x",
"product": {
"name": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.s390x",
"product_id": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter-debuginfo@5.26.3-423.el8_10?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-debuginfo-4:5.26.3-423.el8_10.s390x",
"product": {
"name": "perl-libs-debuginfo-4:5.26.3-423.el8_10.s390x",
"product_id": "perl-libs-debuginfo-4:5.26.3-423.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs-debuginfo@5.26.3-423.el8_10?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-Errno-0:1.28-423.el8_10.s390x",
"product": {
"name": "perl-Errno-0:1.28-423.el8_10.s390x",
"product_id": "perl-Errno-0:1.28-423.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Errno@1.28-423.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-IO-0:1.38-423.el8_10.s390x",
"product": {
"name": "perl-IO-0:1.38-423.el8_10.s390x",
"product_id": "perl-IO-0:1.38-423.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO@1.38-423.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perl-interpreter-4:5.26.3-423.el8_10.s390x",
"product": {
"name": "perl-interpreter-4:5.26.3-423.el8_10.s390x",
"product_id": "perl-interpreter-4:5.26.3-423.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-interpreter@5.26.3-423.el8_10?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-libs-4:5.26.3-423.el8_10.s390x",
"product": {
"name": "perl-libs-4:5.26.3-423.el8_10.s390x",
"product_id": "perl-libs-4:5.26.3-423.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libs@5.26.3-423.el8_10?arch=s390x\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-macros-4:5.26.3-423.el8_10.s390x",
"product": {
"name": "perl-macros-4:5.26.3-423.el8_10.s390x",
"product_id": "perl-macros-4:5.26.3-423.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-macros@5.26.3-423.el8_10?arch=s390x\u0026epoch=4"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-Attribute-Handlers-0:0.99-423.el8_10.noarch",
"product": {
"name": "perl-Attribute-Handlers-0:0.99-423.el8_10.noarch",
"product_id": "perl-Attribute-Handlers-0:0.99-423.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Attribute-Handlers@0.99-423.el8_10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Devel-SelfStubber-0:1.06-423.el8_10.noarch",
"product": {
"name": "perl-Devel-SelfStubber-0:1.06-423.el8_10.noarch",
"product_id": "perl-Devel-SelfStubber-0:1.06-423.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Devel-SelfStubber@1.06-423.el8_10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-ExtUtils-Embed-0:1.34-423.el8_10.noarch",
"product": {
"name": "perl-ExtUtils-Embed-0:1.34-423.el8_10.noarch",
"product_id": "perl-ExtUtils-Embed-0:1.34-423.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ExtUtils-Embed@1.34-423.el8_10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-ExtUtils-Miniperl-0:1.06-423.el8_10.noarch",
"product": {
"name": "perl-ExtUtils-Miniperl-0:1.06-423.el8_10.noarch",
"product_id": "perl-ExtUtils-Miniperl-0:1.06-423.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-ExtUtils-Miniperl@1.06-423.el8_10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Locale-Maketext-Simple-1:0.21-423.el8_10.noarch",
"product": {
"name": "perl-Locale-Maketext-Simple-1:0.21-423.el8_10.noarch",
"product_id": "perl-Locale-Maketext-Simple-1:0.21-423.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Locale-Maketext-Simple@0.21-423.el8_10?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "perl-Memoize-0:1.03-423.el8_10.noarch",
"product": {
"name": "perl-Memoize-0:1.03-423.el8_10.noarch",
"product_id": "perl-Memoize-0:1.03-423.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Memoize@1.03-423.el8_10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Module-Loaded-1:0.08-423.el8_10.noarch",
"product": {
"name": "perl-Module-Loaded-1:0.08-423.el8_10.noarch",
"product_id": "perl-Module-Loaded-1:0.08-423.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Module-Loaded@0.08-423.el8_10?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "perl-Net-Ping-0:2.55-423.el8_10.noarch",
"product": {
"name": "perl-Net-Ping-0:2.55-423.el8_10.noarch",
"product_id": "perl-Net-Ping-0:2.55-423.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Net-Ping@2.55-423.el8_10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Pod-Html-0:1.22.02-423.el8_10.noarch",
"product": {
"name": "perl-Pod-Html-0:1.22.02-423.el8_10.noarch",
"product_id": "perl-Pod-Html-0:1.22.02-423.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Pod-Html@1.22.02-423.el8_10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-SelfLoader-0:1.23-423.el8_10.noarch",
"product": {
"name": "perl-SelfLoader-0:1.23-423.el8_10.noarch",
"product_id": "perl-SelfLoader-0:1.23-423.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-SelfLoader@1.23-423.el8_10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-Test-0:1.30-423.el8_10.noarch",
"product": {
"name": "perl-Test-0:1.30-423.el8_10.noarch",
"product_id": "perl-Test-0:1.30-423.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Test@1.30-423.el8_10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-libnetcfg-4:5.26.3-423.el8_10.noarch",
"product": {
"name": "perl-libnetcfg-4:5.26.3-423.el8_10.noarch",
"product_id": "perl-libnetcfg-4:5.26.3-423.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-libnetcfg@5.26.3-423.el8_10?arch=noarch\u0026epoch=4"
}
}
},
{
"category": "product_version",
"name": "perl-open-0:1.11-423.el8_10.noarch",
"product": {
"name": "perl-open-0:1.11-423.el8_10.noarch",
"product_id": "perl-open-0:1.11-423.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-open@1.11-423.el8_10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-utils-0:5.26.3-423.el8_10.noarch",
"product": {
"name": "perl-utils-0:5.26.3-423.el8_10.noarch",
"product_id": "perl-utils-0:5.26.3-423.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-utils@5.26.3-423.el8_10?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "perl-IO-Zlib-1:1.10-423.el8_10.noarch",
"product": {
"name": "perl-IO-Zlib-1:1.10-423.el8_10.noarch",
"product_id": "perl-IO-Zlib-1:1.10-423.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-IO-Zlib@1.10-423.el8_10?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "perl-Math-Complex-0:1.59-423.el8_10.noarch",
"product": {
"name": "perl-Math-Complex-0:1.59-423.el8_10.noarch",
"product_id": "perl-Math-Complex-0:1.59-423.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl-Math-Complex@1.59-423.el8_10?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-4:5.26.3-423.el8_10.src",
"product": {
"name": "perl-4:5.26.3-423.el8_10.src",
"product_id": "perl-4:5.26.3-423.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perl@5.26.3-423.el8_10?arch=src\u0026epoch=4"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.26.3-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.aarch64"
},
"product_reference": "perl-4:5.26.3-423.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.26.3-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.ppc64le"
},
"product_reference": "perl-4:5.26.3-423.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.26.3-423.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.s390x"
},
"product_reference": "perl-4:5.26.3-423.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.26.3-423.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.src"
},
"product_reference": "perl-4:5.26.3-423.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.26.3-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.x86_64"
},
"product_reference": "perl-4:5.26.3-423.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Attribute-Handlers-0:0.99-423.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Attribute-Handlers-0:0.99-423.el8_10.noarch"
},
"product_reference": "perl-Attribute-Handlers-0:0.99-423.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-0:1.26-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.aarch64"
},
"product_reference": "perl-Devel-Peek-0:1.26-423.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-0:1.26-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.ppc64le"
},
"product_reference": "perl-Devel-Peek-0:1.26-423.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-0:1.26-423.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.s390x"
},
"product_reference": "perl-Devel-Peek-0:1.26-423.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-0:1.26-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.x86_64"
},
"product_reference": "perl-Devel-Peek-0:1.26-423.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.aarch64"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.i686"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.ppc64le"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.s390x"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.x86_64"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-SelfStubber-0:1.06-423.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-SelfStubber-0:1.06-423.el8_10.noarch"
},
"product_reference": "perl-Devel-SelfStubber-0:1.06-423.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Errno-0:1.28-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.aarch64"
},
"product_reference": "perl-Errno-0:1.28-423.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Errno-0:1.28-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.ppc64le"
},
"product_reference": "perl-Errno-0:1.28-423.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Errno-0:1.28-423.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.s390x"
},
"product_reference": "perl-Errno-0:1.28-423.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Errno-0:1.28-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.x86_64"
},
"product_reference": "perl-Errno-0:1.28-423.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ExtUtils-Embed-0:1.34-423.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-ExtUtils-Embed-0:1.34-423.el8_10.noarch"
},
"product_reference": "perl-ExtUtils-Embed-0:1.34-423.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ExtUtils-Miniperl-0:1.06-423.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-ExtUtils-Miniperl-0:1.06-423.el8_10.noarch"
},
"product_reference": "perl-ExtUtils-Miniperl-0:1.06-423.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-0:1.38-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.aarch64"
},
"product_reference": "perl-IO-0:1.38-423.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-0:1.38-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.ppc64le"
},
"product_reference": "perl-IO-0:1.38-423.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-0:1.38-423.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.s390x"
},
"product_reference": "perl-IO-0:1.38-423.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-0:1.38-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.x86_64"
},
"product_reference": "perl-IO-0:1.38-423.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-Zlib-1:1.10-423.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-IO-Zlib-1:1.10-423.el8_10.noarch"
},
"product_reference": "perl-IO-Zlib-1:1.10-423.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.38-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.aarch64"
},
"product_reference": "perl-IO-debuginfo-0:1.38-423.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.38-423.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.i686"
},
"product_reference": "perl-IO-debuginfo-0:1.38-423.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.38-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.ppc64le"
},
"product_reference": "perl-IO-debuginfo-0:1.38-423.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.38-423.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.s390x"
},
"product_reference": "perl-IO-debuginfo-0:1.38-423.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.38-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.x86_64"
},
"product_reference": "perl-IO-debuginfo-0:1.38-423.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Locale-Maketext-Simple-1:0.21-423.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Locale-Maketext-Simple-1:0.21-423.el8_10.noarch"
},
"product_reference": "perl-Locale-Maketext-Simple-1:0.21-423.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Math-Complex-0:1.59-423.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Math-Complex-0:1.59-423.el8_10.noarch"
},
"product_reference": "perl-Math-Complex-0:1.59-423.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Memoize-0:1.03-423.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Memoize-0:1.03-423.el8_10.noarch"
},
"product_reference": "perl-Memoize-0:1.03-423.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Module-Loaded-1:0.08-423.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Module-Loaded-1:0.08-423.el8_10.noarch"
},
"product_reference": "perl-Module-Loaded-1:0.08-423.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Net-Ping-0:2.55-423.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Net-Ping-0:2.55-423.el8_10.noarch"
},
"product_reference": "perl-Net-Ping-0:2.55-423.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Pod-Html-0:1.22.02-423.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Pod-Html-0:1.22.02-423.el8_10.noarch"
},
"product_reference": "perl-Pod-Html-0:1.22.02-423.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SelfLoader-0:1.23-423.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-SelfLoader-0:1.23-423.el8_10.noarch"
},
"product_reference": "perl-SelfLoader-0:1.23-423.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Test-0:1.30-423.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Test-0:1.30-423.el8_10.noarch"
},
"product_reference": "perl-Test-0:1.30-423.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-0:1.31-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.aarch64"
},
"product_reference": "perl-Time-Piece-0:1.31-423.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-0:1.31-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.ppc64le"
},
"product_reference": "perl-Time-Piece-0:1.31-423.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-0:1.31-423.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.s390x"
},
"product_reference": "perl-Time-Piece-0:1.31-423.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-0:1.31-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.x86_64"
},
"product_reference": "perl-Time-Piece-0:1.31-423.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.aarch64"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.i686"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.ppc64le"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.s390x"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.x86_64"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.26.3-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.aarch64"
},
"product_reference": "perl-debuginfo-4:5.26.3-423.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.26.3-423.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.i686"
},
"product_reference": "perl-debuginfo-4:5.26.3-423.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.26.3-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.ppc64le"
},
"product_reference": "perl-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.26.3-423.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.s390x"
},
"product_reference": "perl-debuginfo-4:5.26.3-423.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.26.3-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.x86_64"
},
"product_reference": "perl-debuginfo-4:5.26.3-423.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.26.3-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.aarch64"
},
"product_reference": "perl-debugsource-4:5.26.3-423.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.26.3-423.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.i686"
},
"product_reference": "perl-debugsource-4:5.26.3-423.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.26.3-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.ppc64le"
},
"product_reference": "perl-debugsource-4:5.26.3-423.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.26.3-423.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.s390x"
},
"product_reference": "perl-debugsource-4:5.26.3-423.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.26.3-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.x86_64"
},
"product_reference": "perl-debugsource-4:5.26.3-423.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.26.3-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.aarch64"
},
"product_reference": "perl-devel-4:5.26.3-423.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.26.3-423.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.i686"
},
"product_reference": "perl-devel-4:5.26.3-423.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.26.3-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.ppc64le"
},
"product_reference": "perl-devel-4:5.26.3-423.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.26.3-423.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.s390x"
},
"product_reference": "perl-devel-4:5.26.3-423.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.26.3-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.x86_64"
},
"product_reference": "perl-devel-4:5.26.3-423.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-4:5.26.3-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.aarch64"
},
"product_reference": "perl-interpreter-4:5.26.3-423.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-4:5.26.3-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.ppc64le"
},
"product_reference": "perl-interpreter-4:5.26.3-423.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-4:5.26.3-423.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.s390x"
},
"product_reference": "perl-interpreter-4:5.26.3-423.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-4:5.26.3-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.x86_64"
},
"product_reference": "perl-interpreter-4:5.26.3-423.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.aarch64"
},
"product_reference": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.i686"
},
"product_reference": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.ppc64le"
},
"product_reference": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.s390x"
},
"product_reference": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.x86_64"
},
"product_reference": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libnetcfg-4:5.26.3-423.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-libnetcfg-4:5.26.3-423.el8_10.noarch"
},
"product_reference": "perl-libnetcfg-4:5.26.3-423.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.26.3-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.aarch64"
},
"product_reference": "perl-libs-4:5.26.3-423.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.26.3-423.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.i686"
},
"product_reference": "perl-libs-4:5.26.3-423.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.26.3-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.ppc64le"
},
"product_reference": "perl-libs-4:5.26.3-423.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.26.3-423.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.s390x"
},
"product_reference": "perl-libs-4:5.26.3-423.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.26.3-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.x86_64"
},
"product_reference": "perl-libs-4:5.26.3-423.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.26.3-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.aarch64"
},
"product_reference": "perl-libs-debuginfo-4:5.26.3-423.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.26.3-423.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.i686"
},
"product_reference": "perl-libs-debuginfo-4:5.26.3-423.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.26.3-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.ppc64le"
},
"product_reference": "perl-libs-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.26.3-423.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.s390x"
},
"product_reference": "perl-libs-debuginfo-4:5.26.3-423.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.26.3-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.x86_64"
},
"product_reference": "perl-libs-debuginfo-4:5.26.3-423.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-macros-4:5.26.3-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.aarch64"
},
"product_reference": "perl-macros-4:5.26.3-423.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-macros-4:5.26.3-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.ppc64le"
},
"product_reference": "perl-macros-4:5.26.3-423.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-macros-4:5.26.3-423.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.s390x"
},
"product_reference": "perl-macros-4:5.26.3-423.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-macros-4:5.26.3-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.x86_64"
},
"product_reference": "perl-macros-4:5.26.3-423.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-open-0:1.11-423.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-open-0:1.11-423.el8_10.noarch"
},
"product_reference": "perl-open-0:1.11-423.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-tests-4:5.26.3-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.aarch64"
},
"product_reference": "perl-tests-4:5.26.3-423.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-tests-4:5.26.3-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.ppc64le"
},
"product_reference": "perl-tests-4:5.26.3-423.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-tests-4:5.26.3-423.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.s390x"
},
"product_reference": "perl-tests-4:5.26.3-423.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-tests-4:5.26.3-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.x86_64"
},
"product_reference": "perl-tests-4:5.26.3-423.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-utils-0:5.26.3-423.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:perl-utils-0:5.26.3-423.el8_10.noarch"
},
"product_reference": "perl-utils-0:5.26.3-423.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.26.3-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.aarch64"
},
"product_reference": "perl-4:5.26.3-423.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.26.3-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.ppc64le"
},
"product_reference": "perl-4:5.26.3-423.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.26.3-423.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.s390x"
},
"product_reference": "perl-4:5.26.3-423.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.26.3-423.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.src"
},
"product_reference": "perl-4:5.26.3-423.el8_10.src",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-4:5.26.3-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.x86_64"
},
"product_reference": "perl-4:5.26.3-423.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Attribute-Handlers-0:0.99-423.el8_10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Attribute-Handlers-0:0.99-423.el8_10.noarch"
},
"product_reference": "perl-Attribute-Handlers-0:0.99-423.el8_10.noarch",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-0:1.26-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.aarch64"
},
"product_reference": "perl-Devel-Peek-0:1.26-423.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-0:1.26-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.ppc64le"
},
"product_reference": "perl-Devel-Peek-0:1.26-423.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-0:1.26-423.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.s390x"
},
"product_reference": "perl-Devel-Peek-0:1.26-423.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-0:1.26-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.x86_64"
},
"product_reference": "perl-Devel-Peek-0:1.26-423.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.aarch64"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.i686"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.ppc64le"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.s390x"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.x86_64"
},
"product_reference": "perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Devel-SelfStubber-0:1.06-423.el8_10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-SelfStubber-0:1.06-423.el8_10.noarch"
},
"product_reference": "perl-Devel-SelfStubber-0:1.06-423.el8_10.noarch",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Errno-0:1.28-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.aarch64"
},
"product_reference": "perl-Errno-0:1.28-423.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Errno-0:1.28-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.ppc64le"
},
"product_reference": "perl-Errno-0:1.28-423.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Errno-0:1.28-423.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.s390x"
},
"product_reference": "perl-Errno-0:1.28-423.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Errno-0:1.28-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.x86_64"
},
"product_reference": "perl-Errno-0:1.28-423.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ExtUtils-Embed-0:1.34-423.el8_10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-ExtUtils-Embed-0:1.34-423.el8_10.noarch"
},
"product_reference": "perl-ExtUtils-Embed-0:1.34-423.el8_10.noarch",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-ExtUtils-Miniperl-0:1.06-423.el8_10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-ExtUtils-Miniperl-0:1.06-423.el8_10.noarch"
},
"product_reference": "perl-ExtUtils-Miniperl-0:1.06-423.el8_10.noarch",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-0:1.38-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.aarch64"
},
"product_reference": "perl-IO-0:1.38-423.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-0:1.38-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.ppc64le"
},
"product_reference": "perl-IO-0:1.38-423.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-0:1.38-423.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.s390x"
},
"product_reference": "perl-IO-0:1.38-423.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-0:1.38-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.x86_64"
},
"product_reference": "perl-IO-0:1.38-423.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-Zlib-1:1.10-423.el8_10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-Zlib-1:1.10-423.el8_10.noarch"
},
"product_reference": "perl-IO-Zlib-1:1.10-423.el8_10.noarch",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.38-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.aarch64"
},
"product_reference": "perl-IO-debuginfo-0:1.38-423.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.38-423.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.i686"
},
"product_reference": "perl-IO-debuginfo-0:1.38-423.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.38-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.ppc64le"
},
"product_reference": "perl-IO-debuginfo-0:1.38-423.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.38-423.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.s390x"
},
"product_reference": "perl-IO-debuginfo-0:1.38-423.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-IO-debuginfo-0:1.38-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.x86_64"
},
"product_reference": "perl-IO-debuginfo-0:1.38-423.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Locale-Maketext-Simple-1:0.21-423.el8_10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Locale-Maketext-Simple-1:0.21-423.el8_10.noarch"
},
"product_reference": "perl-Locale-Maketext-Simple-1:0.21-423.el8_10.noarch",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Math-Complex-0:1.59-423.el8_10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Math-Complex-0:1.59-423.el8_10.noarch"
},
"product_reference": "perl-Math-Complex-0:1.59-423.el8_10.noarch",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Memoize-0:1.03-423.el8_10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Memoize-0:1.03-423.el8_10.noarch"
},
"product_reference": "perl-Memoize-0:1.03-423.el8_10.noarch",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Module-Loaded-1:0.08-423.el8_10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Module-Loaded-1:0.08-423.el8_10.noarch"
},
"product_reference": "perl-Module-Loaded-1:0.08-423.el8_10.noarch",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Net-Ping-0:2.55-423.el8_10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Net-Ping-0:2.55-423.el8_10.noarch"
},
"product_reference": "perl-Net-Ping-0:2.55-423.el8_10.noarch",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Pod-Html-0:1.22.02-423.el8_10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Pod-Html-0:1.22.02-423.el8_10.noarch"
},
"product_reference": "perl-Pod-Html-0:1.22.02-423.el8_10.noarch",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-SelfLoader-0:1.23-423.el8_10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-SelfLoader-0:1.23-423.el8_10.noarch"
},
"product_reference": "perl-SelfLoader-0:1.23-423.el8_10.noarch",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Test-0:1.30-423.el8_10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Test-0:1.30-423.el8_10.noarch"
},
"product_reference": "perl-Test-0:1.30-423.el8_10.noarch",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-0:1.31-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.aarch64"
},
"product_reference": "perl-Time-Piece-0:1.31-423.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-0:1.31-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.ppc64le"
},
"product_reference": "perl-Time-Piece-0:1.31-423.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-0:1.31-423.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.s390x"
},
"product_reference": "perl-Time-Piece-0:1.31-423.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-0:1.31-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.x86_64"
},
"product_reference": "perl-Time-Piece-0:1.31-423.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.aarch64"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.i686"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.ppc64le"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.s390x"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.x86_64"
},
"product_reference": "perl-Time-Piece-debuginfo-0:1.31-423.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.26.3-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.aarch64"
},
"product_reference": "perl-debuginfo-4:5.26.3-423.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.26.3-423.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.i686"
},
"product_reference": "perl-debuginfo-4:5.26.3-423.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.26.3-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.ppc64le"
},
"product_reference": "perl-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.26.3-423.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.s390x"
},
"product_reference": "perl-debuginfo-4:5.26.3-423.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debuginfo-4:5.26.3-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.x86_64"
},
"product_reference": "perl-debuginfo-4:5.26.3-423.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.26.3-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.aarch64"
},
"product_reference": "perl-debugsource-4:5.26.3-423.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.26.3-423.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.i686"
},
"product_reference": "perl-debugsource-4:5.26.3-423.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.26.3-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.ppc64le"
},
"product_reference": "perl-debugsource-4:5.26.3-423.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.26.3-423.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.s390x"
},
"product_reference": "perl-debugsource-4:5.26.3-423.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-debugsource-4:5.26.3-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.x86_64"
},
"product_reference": "perl-debugsource-4:5.26.3-423.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.26.3-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.aarch64"
},
"product_reference": "perl-devel-4:5.26.3-423.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.26.3-423.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.i686"
},
"product_reference": "perl-devel-4:5.26.3-423.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.26.3-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.ppc64le"
},
"product_reference": "perl-devel-4:5.26.3-423.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.26.3-423.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.s390x"
},
"product_reference": "perl-devel-4:5.26.3-423.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-devel-4:5.26.3-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.x86_64"
},
"product_reference": "perl-devel-4:5.26.3-423.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-4:5.26.3-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.aarch64"
},
"product_reference": "perl-interpreter-4:5.26.3-423.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-4:5.26.3-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.ppc64le"
},
"product_reference": "perl-interpreter-4:5.26.3-423.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-4:5.26.3-423.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.s390x"
},
"product_reference": "perl-interpreter-4:5.26.3-423.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-4:5.26.3-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.x86_64"
},
"product_reference": "perl-interpreter-4:5.26.3-423.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.aarch64"
},
"product_reference": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.i686"
},
"product_reference": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.ppc64le"
},
"product_reference": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.s390x"
},
"product_reference": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.x86_64"
},
"product_reference": "perl-interpreter-debuginfo-4:5.26.3-423.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libnetcfg-4:5.26.3-423.el8_10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-libnetcfg-4:5.26.3-423.el8_10.noarch"
},
"product_reference": "perl-libnetcfg-4:5.26.3-423.el8_10.noarch",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.26.3-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.aarch64"
},
"product_reference": "perl-libs-4:5.26.3-423.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.26.3-423.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.i686"
},
"product_reference": "perl-libs-4:5.26.3-423.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.26.3-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.ppc64le"
},
"product_reference": "perl-libs-4:5.26.3-423.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.26.3-423.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.s390x"
},
"product_reference": "perl-libs-4:5.26.3-423.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-4:5.26.3-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.x86_64"
},
"product_reference": "perl-libs-4:5.26.3-423.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.26.3-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.aarch64"
},
"product_reference": "perl-libs-debuginfo-4:5.26.3-423.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.26.3-423.el8_10.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.i686"
},
"product_reference": "perl-libs-debuginfo-4:5.26.3-423.el8_10.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.26.3-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.ppc64le"
},
"product_reference": "perl-libs-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.26.3-423.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.s390x"
},
"product_reference": "perl-libs-debuginfo-4:5.26.3-423.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-libs-debuginfo-4:5.26.3-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.x86_64"
},
"product_reference": "perl-libs-debuginfo-4:5.26.3-423.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-macros-4:5.26.3-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.aarch64"
},
"product_reference": "perl-macros-4:5.26.3-423.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-macros-4:5.26.3-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.ppc64le"
},
"product_reference": "perl-macros-4:5.26.3-423.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-macros-4:5.26.3-423.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.s390x"
},
"product_reference": "perl-macros-4:5.26.3-423.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-macros-4:5.26.3-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.x86_64"
},
"product_reference": "perl-macros-4:5.26.3-423.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-open-0:1.11-423.el8_10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-open-0:1.11-423.el8_10.noarch"
},
"product_reference": "perl-open-0:1.11-423.el8_10.noarch",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-tests-4:5.26.3-423.el8_10.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.aarch64"
},
"product_reference": "perl-tests-4:5.26.3-423.el8_10.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-tests-4:5.26.3-423.el8_10.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.ppc64le"
},
"product_reference": "perl-tests-4:5.26.3-423.el8_10.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-tests-4:5.26.3-423.el8_10.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.s390x"
},
"product_reference": "perl-tests-4:5.26.3-423.el8_10.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-tests-4:5.26.3-423.el8_10.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.x86_64"
},
"product_reference": "perl-tests-4:5.26.3-423.el8_10.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-utils-0:5.26.3-423.el8_10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:perl-utils-0:5.26.3-423.el8_10.noarch"
},
"product_reference": "perl-utils-0:5.26.3-423.el8_10.noarch",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-40909",
"cwe": {
"id": "CWE-426",
"name": "Untrusted Search Path"
},
"discovery_date": "2025-05-30T13:00:49.546076+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2369407"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Perl standard library threads component. This vulnerability can allow a local attacker to exploit a race condition in directory handling to access files or load code from unexpected locations.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "perl: Perl threads have a working directory race condition where file operations may target unintended paths",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to the successful exploitation of a CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027) or CWE-426: Untrusted Search Path vulnerability, and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat enforces least functionality by enabling only essential features, services, and ports to reduce the system\u2019s attack surface. Static code analysis, peer reviews, and robust input validation and error handling detect unsafe input that could affect execution timing or path resolution. Real-time threat detection, including IPS/IDS, antimalware, and continuous system monitoring, enables rapid identification of exploitation attempts. Process isolation reduces the likelihood of concurrent execution conflicts and contains any impact to isolated workloads. Executable search paths are restricted to trusted, explicitly defined directories, mitigating the risk of executing malicious files. These controls effectively lower the likelihood and impact of race conditions and untrusted path exploitation in the environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Attribute-Handlers-0:0.99-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-SelfStubber-0:1.06-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-ExtUtils-Embed-0:1.34-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-ExtUtils-Miniperl-0:1.06-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-Zlib-1:1.10-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Locale-Maketext-Simple-1:0.21-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Math-Complex-0:1.59-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Memoize-0:1.03-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Module-Loaded-1:0.08-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Net-Ping-0:2.55-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Pod-Html-0:1.22.02-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-SelfLoader-0:1.23-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Test-0:1.30-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libnetcfg-4:5.26.3-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-open-0:1.11-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-utils-0:5.26.3-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Attribute-Handlers-0:0.99-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-SelfStubber-0:1.06-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-ExtUtils-Embed-0:1.34-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-ExtUtils-Miniperl-0:1.06-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-Zlib-1:1.10-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Locale-Maketext-Simple-1:0.21-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Math-Complex-0:1.59-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Memoize-0:1.03-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Module-Loaded-1:0.08-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Net-Ping-0:2.55-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Pod-Html-0:1.22.02-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-SelfLoader-0:1.23-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Test-0:1.30-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libnetcfg-4:5.26.3-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-open-0:1.11-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-utils-0:5.26.3-423.el8_10.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-40909"
},
{
"category": "external",
"summary": "RHBZ#2369407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369407"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-40909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40909"
},
{
"category": "external",
"summary": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226"
},
{
"category": "external",
"summary": "https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e",
"url": "https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e"
},
{
"category": "external",
"summary": "https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch",
"url": "https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch"
},
{
"category": "external",
"summary": "https://github.com/Perl/perl5/issues/10387",
"url": "https://github.com/Perl/perl5/issues/10387"
},
{
"category": "external",
"summary": "https://github.com/Perl/perl5/issues/23010",
"url": "https://github.com/Perl/perl5/issues/23010"
},
{
"category": "external",
"summary": "https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads",
"url": "https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/05/22/2",
"url": "https://www.openwall.com/lists/oss-security/2025/05/22/2"
}
],
"release_date": "2025-05-30T12:20:11.237000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-28T02:24:30+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Attribute-Handlers-0:0.99-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-SelfStubber-0:1.06-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-ExtUtils-Embed-0:1.34-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-ExtUtils-Miniperl-0:1.06-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-Zlib-1:1.10-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Locale-Maketext-Simple-1:0.21-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Math-Complex-0:1.59-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Memoize-0:1.03-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Module-Loaded-1:0.08-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Net-Ping-0:2.55-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Pod-Html-0:1.22.02-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-SelfLoader-0:1.23-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Test-0:1.30-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libnetcfg-4:5.26.3-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-open-0:1.11-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-utils-0:5.26.3-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Attribute-Handlers-0:0.99-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-SelfStubber-0:1.06-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-ExtUtils-Embed-0:1.34-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-ExtUtils-Miniperl-0:1.06-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-Zlib-1:1.10-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Locale-Maketext-Simple-1:0.21-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Math-Complex-0:1.59-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Memoize-0:1.03-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Module-Loaded-1:0.08-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Net-Ping-0:2.55-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Pod-Html-0:1.22.02-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-SelfLoader-0:1.23-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Test-0:1.30-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libnetcfg-4:5.26.3-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-open-0:1.11-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-utils-0:5.26.3-423.el8_10.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:11805"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Attribute-Handlers-0:0.99-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-SelfStubber-0:1.06-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-ExtUtils-Embed-0:1.34-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-ExtUtils-Miniperl-0:1.06-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-Zlib-1:1.10-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Locale-Maketext-Simple-1:0.21-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Math-Complex-0:1.59-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Memoize-0:1.03-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Module-Loaded-1:0.08-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Net-Ping-0:2.55-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Pod-Html-0:1.22.02-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-SelfLoader-0:1.23-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Test-0:1.30-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libnetcfg-4:5.26.3-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-open-0:1.11-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-utils-0:5.26.3-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Attribute-Handlers-0:0.99-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-SelfStubber-0:1.06-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-ExtUtils-Embed-0:1.34-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-ExtUtils-Miniperl-0:1.06-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-Zlib-1:1.10-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Locale-Maketext-Simple-1:0.21-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Math-Complex-0:1.59-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Memoize-0:1.03-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Module-Loaded-1:0.08-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Net-Ping-0:2.55-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Pod-Html-0:1.22.02-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-SelfLoader-0:1.23-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Test-0:1.30-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libnetcfg-4:5.26.3-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-open-0:1.11-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-utils-0:5.26.3-423.el8_10.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Attribute-Handlers-0:0.99-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Devel-SelfStubber-0:1.06-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-ExtUtils-Embed-0:1.34-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-ExtUtils-Miniperl-0:1.06-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-Zlib-1:1.10-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Locale-Maketext-Simple-1:0.21-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Math-Complex-0:1.59-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Memoize-0:1.03-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Module-Loaded-1:0.08-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Net-Ping-0:2.55-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Pod-Html-0:1.22.02-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-SelfLoader-0:1.23-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Test-0:1.30-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libnetcfg-4:5.26.3-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-open-0:1.11-423.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:perl-utils-0:5.26.3-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Attribute-Handlers-0:0.99-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-0:1.26-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-Peek-debuginfo-0:1.26-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Devel-SelfStubber-0:1.06-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Errno-0:1.28-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-ExtUtils-Embed-0:1.34-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-ExtUtils-Miniperl-0:1.06-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-0:1.38-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-Zlib-1:1.10-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-IO-debuginfo-0:1.38-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Locale-Maketext-Simple-1:0.21-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Math-Complex-0:1.59-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Memoize-0:1.03-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Module-Loaded-1:0.08-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Net-Ping-0:2.55-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Pod-Html-0:1.22.02-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-SelfLoader-0:1.23-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Test-0:1.30-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-0:1.31-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-Time-Piece-debuginfo-0:1.31-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debuginfo-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-debugsource-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-devel-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-interpreter-debuginfo-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libnetcfg-4:5.26.3-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-libs-debuginfo-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-macros-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-open-0:1.11-423.el8_10.noarch",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-tests-4:5.26.3-423.el8_10.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:perl-utils-0:5.26.3-423.el8_10.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "perl: Perl threads have a working directory race condition where file operations may target unintended paths"
}
]
}
opensuse-su-2025:15258-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "perl-32bit-5.40.2-3.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the perl-32bit-5.40.2-3.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15258",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15258-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40909 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40909/"
}
],
"title": "perl-32bit-5.40.2-3.1 on GA media",
"tracking": {
"current_release_date": "2025-07-03T00:00:00Z",
"generator": {
"date": "2025-07-03T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15258-1",
"initial_release_date": "2025-07-03T00:00:00Z",
"revision_history": [
{
"date": "2025-07-03T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "perl-5.40.2-3.1.aarch64",
"product": {
"name": "perl-5.40.2-3.1.aarch64",
"product_id": "perl-5.40.2-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "perl-32bit-5.40.2-3.1.aarch64",
"product": {
"name": "perl-32bit-5.40.2-3.1.aarch64",
"product_id": "perl-32bit-5.40.2-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "perl-base-5.40.2-3.1.aarch64",
"product": {
"name": "perl-base-5.40.2-3.1.aarch64",
"product_id": "perl-base-5.40.2-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "perl-base-32bit-5.40.2-3.1.aarch64",
"product": {
"name": "perl-base-32bit-5.40.2-3.1.aarch64",
"product_id": "perl-base-32bit-5.40.2-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "perl-doc-5.40.2-3.1.aarch64",
"product": {
"name": "perl-doc-5.40.2-3.1.aarch64",
"product_id": "perl-doc-5.40.2-3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-5.40.2-3.1.ppc64le",
"product": {
"name": "perl-5.40.2-3.1.ppc64le",
"product_id": "perl-5.40.2-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "perl-32bit-5.40.2-3.1.ppc64le",
"product": {
"name": "perl-32bit-5.40.2-3.1.ppc64le",
"product_id": "perl-32bit-5.40.2-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "perl-base-5.40.2-3.1.ppc64le",
"product": {
"name": "perl-base-5.40.2-3.1.ppc64le",
"product_id": "perl-base-5.40.2-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "perl-base-32bit-5.40.2-3.1.ppc64le",
"product": {
"name": "perl-base-32bit-5.40.2-3.1.ppc64le",
"product_id": "perl-base-32bit-5.40.2-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "perl-doc-5.40.2-3.1.ppc64le",
"product": {
"name": "perl-doc-5.40.2-3.1.ppc64le",
"product_id": "perl-doc-5.40.2-3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-5.40.2-3.1.s390x",
"product": {
"name": "perl-5.40.2-3.1.s390x",
"product_id": "perl-5.40.2-3.1.s390x"
}
},
{
"category": "product_version",
"name": "perl-32bit-5.40.2-3.1.s390x",
"product": {
"name": "perl-32bit-5.40.2-3.1.s390x",
"product_id": "perl-32bit-5.40.2-3.1.s390x"
}
},
{
"category": "product_version",
"name": "perl-base-5.40.2-3.1.s390x",
"product": {
"name": "perl-base-5.40.2-3.1.s390x",
"product_id": "perl-base-5.40.2-3.1.s390x"
}
},
{
"category": "product_version",
"name": "perl-base-32bit-5.40.2-3.1.s390x",
"product": {
"name": "perl-base-32bit-5.40.2-3.1.s390x",
"product_id": "perl-base-32bit-5.40.2-3.1.s390x"
}
},
{
"category": "product_version",
"name": "perl-doc-5.40.2-3.1.s390x",
"product": {
"name": "perl-doc-5.40.2-3.1.s390x",
"product_id": "perl-doc-5.40.2-3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "perl-5.40.2-3.1.x86_64",
"product": {
"name": "perl-5.40.2-3.1.x86_64",
"product_id": "perl-5.40.2-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "perl-32bit-5.40.2-3.1.x86_64",
"product": {
"name": "perl-32bit-5.40.2-3.1.x86_64",
"product_id": "perl-32bit-5.40.2-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "perl-base-5.40.2-3.1.x86_64",
"product": {
"name": "perl-base-5.40.2-3.1.x86_64",
"product_id": "perl-base-5.40.2-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "perl-base-32bit-5.40.2-3.1.x86_64",
"product": {
"name": "perl-base-32bit-5.40.2-3.1.x86_64",
"product_id": "perl-base-32bit-5.40.2-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "perl-doc-5.40.2-3.1.x86_64",
"product": {
"name": "perl-doc-5.40.2-3.1.x86_64",
"product_id": "perl-doc-5.40.2-3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.40.2-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-5.40.2-3.1.aarch64"
},
"product_reference": "perl-5.40.2-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.40.2-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-5.40.2-3.1.ppc64le"
},
"product_reference": "perl-5.40.2-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.40.2-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-5.40.2-3.1.s390x"
},
"product_reference": "perl-5.40.2-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-5.40.2-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-5.40.2-3.1.x86_64"
},
"product_reference": "perl-5.40.2-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-32bit-5.40.2-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-32bit-5.40.2-3.1.aarch64"
},
"product_reference": "perl-32bit-5.40.2-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-32bit-5.40.2-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-32bit-5.40.2-3.1.ppc64le"
},
"product_reference": "perl-32bit-5.40.2-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-32bit-5.40.2-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-32bit-5.40.2-3.1.s390x"
},
"product_reference": "perl-32bit-5.40.2-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-32bit-5.40.2-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-32bit-5.40.2-3.1.x86_64"
},
"product_reference": "perl-32bit-5.40.2-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.40.2-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-base-5.40.2-3.1.aarch64"
},
"product_reference": "perl-base-5.40.2-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.40.2-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-base-5.40.2-3.1.ppc64le"
},
"product_reference": "perl-base-5.40.2-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.40.2-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-base-5.40.2-3.1.s390x"
},
"product_reference": "perl-base-5.40.2-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-5.40.2-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-base-5.40.2-3.1.x86_64"
},
"product_reference": "perl-base-5.40.2-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-32bit-5.40.2-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-base-32bit-5.40.2-3.1.aarch64"
},
"product_reference": "perl-base-32bit-5.40.2-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-32bit-5.40.2-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-base-32bit-5.40.2-3.1.ppc64le"
},
"product_reference": "perl-base-32bit-5.40.2-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-32bit-5.40.2-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-base-32bit-5.40.2-3.1.s390x"
},
"product_reference": "perl-base-32bit-5.40.2-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-base-32bit-5.40.2-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-base-32bit-5.40.2-3.1.x86_64"
},
"product_reference": "perl-base-32bit-5.40.2-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-doc-5.40.2-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-doc-5.40.2-3.1.aarch64"
},
"product_reference": "perl-doc-5.40.2-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-doc-5.40.2-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-doc-5.40.2-3.1.ppc64le"
},
"product_reference": "perl-doc-5.40.2-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-doc-5.40.2-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-doc-5.40.2-3.1.s390x"
},
"product_reference": "perl-doc-5.40.2-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-doc-5.40.2-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-doc-5.40.2-3.1.x86_64"
},
"product_reference": "perl-doc-5.40.2-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-40909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40909"
}
],
"notes": [
{
"category": "general",
"text": "Perl threads have a working directory race condition where file operations may target unintended paths.\n\nIf a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone that handle for the new thread, which is visible from any third (or more) thread already running. \n\nThis may lead to unintended operations such as loading code or accessing files from unexpected locations, which a local attacker may be able to exploit.\n\nThe bug was introduced in commit 11a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:perl-32bit-5.40.2-3.1.aarch64",
"openSUSE Tumbleweed:perl-32bit-5.40.2-3.1.ppc64le",
"openSUSE Tumbleweed:perl-32bit-5.40.2-3.1.s390x",
"openSUSE Tumbleweed:perl-32bit-5.40.2-3.1.x86_64",
"openSUSE Tumbleweed:perl-5.40.2-3.1.aarch64",
"openSUSE Tumbleweed:perl-5.40.2-3.1.ppc64le",
"openSUSE Tumbleweed:perl-5.40.2-3.1.s390x",
"openSUSE Tumbleweed:perl-5.40.2-3.1.x86_64",
"openSUSE Tumbleweed:perl-base-32bit-5.40.2-3.1.aarch64",
"openSUSE Tumbleweed:perl-base-32bit-5.40.2-3.1.ppc64le",
"openSUSE Tumbleweed:perl-base-32bit-5.40.2-3.1.s390x",
"openSUSE Tumbleweed:perl-base-32bit-5.40.2-3.1.x86_64",
"openSUSE Tumbleweed:perl-base-5.40.2-3.1.aarch64",
"openSUSE Tumbleweed:perl-base-5.40.2-3.1.ppc64le",
"openSUSE Tumbleweed:perl-base-5.40.2-3.1.s390x",
"openSUSE Tumbleweed:perl-base-5.40.2-3.1.x86_64",
"openSUSE Tumbleweed:perl-doc-5.40.2-3.1.aarch64",
"openSUSE Tumbleweed:perl-doc-5.40.2-3.1.ppc64le",
"openSUSE Tumbleweed:perl-doc-5.40.2-3.1.s390x",
"openSUSE Tumbleweed:perl-doc-5.40.2-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40909",
"url": "https://www.suse.com/security/cve/CVE-2025-40909"
},
{
"category": "external",
"summary": "SUSE Bug 1244079 for CVE-2025-40909",
"url": "https://bugzilla.suse.com/1244079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:perl-32bit-5.40.2-3.1.aarch64",
"openSUSE Tumbleweed:perl-32bit-5.40.2-3.1.ppc64le",
"openSUSE Tumbleweed:perl-32bit-5.40.2-3.1.s390x",
"openSUSE Tumbleweed:perl-32bit-5.40.2-3.1.x86_64",
"openSUSE Tumbleweed:perl-5.40.2-3.1.aarch64",
"openSUSE Tumbleweed:perl-5.40.2-3.1.ppc64le",
"openSUSE Tumbleweed:perl-5.40.2-3.1.s390x",
"openSUSE Tumbleweed:perl-5.40.2-3.1.x86_64",
"openSUSE Tumbleweed:perl-base-32bit-5.40.2-3.1.aarch64",
"openSUSE Tumbleweed:perl-base-32bit-5.40.2-3.1.ppc64le",
"openSUSE Tumbleweed:perl-base-32bit-5.40.2-3.1.s390x",
"openSUSE Tumbleweed:perl-base-32bit-5.40.2-3.1.x86_64",
"openSUSE Tumbleweed:perl-base-5.40.2-3.1.aarch64",
"openSUSE Tumbleweed:perl-base-5.40.2-3.1.ppc64le",
"openSUSE Tumbleweed:perl-base-5.40.2-3.1.s390x",
"openSUSE Tumbleweed:perl-base-5.40.2-3.1.x86_64",
"openSUSE Tumbleweed:perl-doc-5.40.2-3.1.aarch64",
"openSUSE Tumbleweed:perl-doc-5.40.2-3.1.ppc64le",
"openSUSE Tumbleweed:perl-doc-5.40.2-3.1.s390x",
"openSUSE Tumbleweed:perl-doc-5.40.2-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:perl-32bit-5.40.2-3.1.aarch64",
"openSUSE Tumbleweed:perl-32bit-5.40.2-3.1.ppc64le",
"openSUSE Tumbleweed:perl-32bit-5.40.2-3.1.s390x",
"openSUSE Tumbleweed:perl-32bit-5.40.2-3.1.x86_64",
"openSUSE Tumbleweed:perl-5.40.2-3.1.aarch64",
"openSUSE Tumbleweed:perl-5.40.2-3.1.ppc64le",
"openSUSE Tumbleweed:perl-5.40.2-3.1.s390x",
"openSUSE Tumbleweed:perl-5.40.2-3.1.x86_64",
"openSUSE Tumbleweed:perl-base-32bit-5.40.2-3.1.aarch64",
"openSUSE Tumbleweed:perl-base-32bit-5.40.2-3.1.ppc64le",
"openSUSE Tumbleweed:perl-base-32bit-5.40.2-3.1.s390x",
"openSUSE Tumbleweed:perl-base-32bit-5.40.2-3.1.x86_64",
"openSUSE Tumbleweed:perl-base-5.40.2-3.1.aarch64",
"openSUSE Tumbleweed:perl-base-5.40.2-3.1.ppc64le",
"openSUSE Tumbleweed:perl-base-5.40.2-3.1.s390x",
"openSUSE Tumbleweed:perl-base-5.40.2-3.1.x86_64",
"openSUSE Tumbleweed:perl-doc-5.40.2-3.1.aarch64",
"openSUSE Tumbleweed:perl-doc-5.40.2-3.1.ppc64le",
"openSUSE Tumbleweed:perl-doc-5.40.2-3.1.s390x",
"openSUSE Tumbleweed:perl-doc-5.40.2-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-40909"
}
]
}
msrc_cve-2025-40909
Vulnerability from csaf_microsoft
Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40909 Perl threads have a working directory race condition where file operations may target unintended paths - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-40909.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Perl threads have a working directory race condition where file operations may target unintended paths",
"tracking": {
"current_release_date": "2025-07-29T00:00:00.000Z",
"generator": {
"date": "2025-10-20T03:18:58.601Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-40909",
"initial_release_date": "2025-05-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-07-29T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccm2 perl 5.34.1-491",
"product": {
"name": "\u003ccm2 perl 5.34.1-491",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "cm2 perl 5.34.1-491",
"product": {
"name": "cm2 perl 5.34.1-491",
"product_id": "19554"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 perl 5.34.1-491",
"product": {
"name": "\u003ccbl2 perl 5.34.1-491",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cbl2 perl 5.34.1-491",
"product": {
"name": "cbl2 perl 5.34.1-491",
"product_id": "20310"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 perl 5.38.2-509",
"product": {
"name": "\u003cazl3 perl 5.38.2-509",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 perl 5.38.2-509",
"product": {
"name": "azl3 perl 5.38.2-509",
"product_id": "20313"
}
}
],
"category": "product_name",
"name": "perl"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm2 perl 5.34.1-491 as a component of CBL Mariner 2.0",
"product_id": "17086-3"
},
"product_reference": "3",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm2 perl 5.34.1-491 as a component of CBL Mariner 2.0",
"product_id": "19554-17086"
},
"product_reference": "19554",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 perl 5.34.1-491 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 perl 5.34.1-491 as a component of CBL Mariner 2.0",
"product_id": "20310-17086"
},
"product_reference": "20310",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 perl 5.38.2-509 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 perl 5.38.2-509 as a component of Azure Linux 3.0",
"product_id": "20313-17084"
},
"product_reference": "20313",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-40909",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0026#39;Race Condition\u0026#39;)"
},
"notes": [
{
"category": "general",
"text": "CPANSec",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"19554-17086",
"20310-17086",
"20313-17084"
],
"known_affected": [
"17086-3",
"17086-2",
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-40909 Perl threads have a working directory race condition where file operations may target unintended paths - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-40909.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-29T00:00:00.000Z",
"details": "5.34.1-491:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-3",
"17086-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-07-29T00:00:00.000Z",
"details": "5.38.2-509:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalsScore": 0.0,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.9,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"17086-3",
"17086-2",
"17084-1"
]
}
],
"title": "Perl threads have a working directory race condition where file operations may target unintended paths"
}
]
}
wid-sec-w-2025-1206
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Perl ist eine freie, plattformunabh\u00e4ngige und interpretierte Programmiersprache (Skriptsprache).",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle in Perl ausnutzen, um beliebigen Programmcode auszuf\u00fchren, und um Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1206 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1206.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1206 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1206"
},
{
"category": "external",
"summary": "RedHat Bugzilla vom 2025-06-01",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2369407"
},
{
"category": "external",
"summary": "OSS Security Mailing List vom 2025-06-01",
"url": "https://seclists.org/oss-sec/2025/q2/188"
},
{
"category": "external",
"summary": "NIST CVE-2025-40909",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40909"
},
{
"category": "external",
"summary": "PoC f\u00fcr CVE-2025-40909",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1981 vom 2025-06-10",
"url": "https://alas.aws.amazon.com/ALAS-2025-1981.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2879 vom 2025-06-12",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2879.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02027-1 vom 2025-06-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021584.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02051-1 vom 2025-06-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021611.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-2879 vom 2025-06-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2879.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20456-1 vom 2025-07-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021754.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15258-1 vom 2025-07-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LVMR5UHUOVD62XS7YRCDYD3VX34VY7JP/"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-F142899732 vom 2025-07-10",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-f142899732"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-30244EBFC7 vom 2025-07-10",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-30244ebfc7"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11545 vom 2025-07-22",
"url": "https://access.redhat.com/errata/RHSA-2025:11545"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-11804 vom 2025-07-29",
"url": "http://linux.oracle.com/errata/ELSA-2025-11804.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11675 vom 2025-07-29",
"url": "https://access.redhat.com/errata/RHSA-2025:11675"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-11805 vom 2025-07-29",
"url": "http://linux.oracle.com/errata/ELSA-2025-11805.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12056 vom 2025-07-29",
"url": "https://access.redhat.com/errata/RHSA-2025:12056"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7678-1 vom 2025-07-29",
"url": "https://ubuntu.com/security/notices/USN-7678-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-12056 vom 2025-07-29",
"url": "https://linux.oracle.com/errata/ELSA-2025-12056.html"
}
],
"source_lang": "en-US",
"title": "Perl: Schwachstelle erm\u00f6glicht Codeausf\u00fchrung und Offenlegung von Informationen",
"tracking": {
"current_release_date": "2025-07-29T22:00:00.000+00:00",
"generator": {
"date": "2025-07-30T08:45:00.247+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1206",
"initial_release_date": "2025-06-01T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-06-01T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-06-09T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-06-12T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-06-19T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-22T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-30T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-07-06T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE und openSUSE aufgenommen"
},
{
"date": "2025-07-09T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2025-07-22T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-28T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2025-07-29T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "11"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=5.13.6",
"product": {
"name": "Open Source Perl \u003e=5.13.6",
"product_id": "T044249"
}
},
{
"category": "product_version_range",
"name": "\u003e=5.13.6",
"product": {
"name": "Open Source Perl \u003e=5.13.6",
"product_id": "T044249-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c5.41.13",
"product": {
"name": "Open Source Perl \u003c5.41.13",
"product_id": "T044251"
}
},
{
"category": "product_version",
"name": "5.41.13",
"product": {
"name": "Open Source Perl 5.41.13",
"product_id": "T044251-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:perl:perl:5.41.13"
}
}
}
],
"category": "product_name",
"name": "Perl"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-40909",
"product_status": {
"known_affected": [
"T002207",
"67646",
"T000126",
"T027843",
"398363",
"T044251",
"T004914",
"74185"
]
},
"release_date": "2025-06-01T22:00:00.000+00:00",
"title": "CVE-2025-40909"
}
]
}
wid-sec-w-2025-2063
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um Root-Rechte zu erlangen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren, vertrauliche Informationen preiszugeben, Daten zu ver\u00e4ndern oder Sicherheitsma\u00dfnahmen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- MacOS X",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2063 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2063.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2063 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2063"
},
{
"category": "external",
"summary": "APPLE-SA-09-15-2025-5 macOS Tahoe 26 vom 2025-09-15",
"url": "https://lists.apple.com/archives/security-announce/2025/Sep/msg00004.html"
},
{
"category": "external",
"summary": "APPLE-SA-09-15-2025-6 macOS Sequoia 15.7 vom 2025-09-15",
"url": "https://lists.apple.com/archives/security-announce/2025/Sep/msg00005.html"
},
{
"category": "external",
"summary": "APPLE-SA-09-15-2025-7 macOS Sonoma 14.8 vom 2025-09-15",
"url": "https://lists.apple.com/archives/security-announce/2025/Sep/msg00006.html"
},
{
"category": "external",
"summary": "macOS Tahoe 26 vom 2025-09-15",
"url": "https://support.apple.com/en-us/125110"
},
{
"category": "external",
"summary": "macOS Sequoia 15.7 vom 2025-09-15",
"url": "https://support.apple.com/en-us/125111"
},
{
"category": "external",
"summary": "macOS Sonoma 14.8 vom 2025-09-15",
"url": "https://support.apple.com/en-us/125112"
}
],
"source_lang": "en-US",
"title": "Apple macOS Sequoia, Sonoma und Tahoe: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-10-09T22:00:00.000+00:00",
"generator": {
"date": "2025-10-10T06:19:53.662+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-2063",
"initial_release_date": "2025-09-15T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-09-15T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-09-16T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-29277, EUVD-2025-29271, EUVD-2025-29273, EUVD-2025-29274, EUVD-2025-29275, EUVD-2025-29278, EUVD-2025-29276"
},
{
"date": "2025-10-09T22:00:00.000+00:00",
"number": "3",
"summary": "CVE erg\u00e4nzt"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "Tahoe \u003c26",
"product": {
"name": "Apple macOS Tahoe \u003c26",
"product_id": "T047014"
}
},
{
"category": "product_version",
"name": "Tahoe 26",
"product": {
"name": "Apple macOS Tahoe 26",
"product_id": "T047014-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:tahoe__26"
}
}
},
{
"category": "product_version_range",
"name": "Sequoia \u003c15.7",
"product": {
"name": "Apple macOS Sequoia \u003c15.7",
"product_id": "T047015"
}
},
{
"category": "product_version",
"name": "Sequoia 15.7",
"product": {
"name": "Apple macOS Sequoia 15.7",
"product_id": "T047015-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:sequoia__15.7"
}
}
},
{
"category": "product_version_range",
"name": "Sonoma \u003c14.8",
"product": {
"name": "Apple macOS Sonoma \u003c14.8",
"product_id": "T047016"
}
},
{
"category": "product_version",
"name": "Sonoma 14.8",
"product": {
"name": "Apple macOS Sonoma 14.8",
"product_id": "T047016-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:apple:mac_os:sonoma__14.8"
}
}
}
],
"category": "product_name",
"name": "macOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-27280",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2024-27280"
},
{
"cve": "CVE-2025-24088",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-24088"
},
{
"cve": "CVE-2025-24197",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-24197"
},
{
"cve": "CVE-2025-31255",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-31255"
},
{
"cve": "CVE-2025-31259",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-31259"
},
{
"cve": "CVE-2025-31268",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-31268"
},
{
"cve": "CVE-2025-31269",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-31269"
},
{
"cve": "CVE-2025-31270",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-31270"
},
{
"cve": "CVE-2025-31271",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-31271"
},
{
"cve": "CVE-2025-40909",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-40909"
},
{
"cve": "CVE-2025-43190",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43190"
},
{
"cve": "CVE-2025-43204",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43204"
},
{
"cve": "CVE-2025-43207",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43207"
},
{
"cve": "CVE-2025-43208",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43208"
},
{
"cve": "CVE-2025-43231",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43231"
},
{
"cve": "CVE-2025-43262",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43262"
},
{
"cve": "CVE-2025-43272",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43272"
},
{
"cve": "CVE-2025-43273",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43273"
},
{
"cve": "CVE-2025-43277",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43277"
},
{
"cve": "CVE-2025-43279",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43279"
},
{
"cve": "CVE-2025-43283",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43283"
},
{
"cve": "CVE-2025-43285",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43285"
},
{
"cve": "CVE-2025-43286",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43286"
},
{
"cve": "CVE-2025-43287",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43287"
},
{
"cve": "CVE-2025-43291",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43291"
},
{
"cve": "CVE-2025-43292",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43292"
},
{
"cve": "CVE-2025-43293",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43293"
},
{
"cve": "CVE-2025-43294",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43294"
},
{
"cve": "CVE-2025-43295",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43295"
},
{
"cve": "CVE-2025-43296",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43296"
},
{
"cve": "CVE-2025-43297",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43297"
},
{
"cve": "CVE-2025-43298",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43298"
},
{
"cve": "CVE-2025-43299",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43299"
},
{
"cve": "CVE-2025-43301",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43301"
},
{
"cve": "CVE-2025-43302",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43302"
},
{
"cve": "CVE-2025-43303",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43303"
},
{
"cve": "CVE-2025-43304",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43304"
},
{
"cve": "CVE-2025-43305",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43305"
},
{
"cve": "CVE-2025-43307",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43307"
},
{
"cve": "CVE-2025-43308",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43308"
},
{
"cve": "CVE-2025-43310",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43310"
},
{
"cve": "CVE-2025-43311",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43311"
},
{
"cve": "CVE-2025-43312",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43312"
},
{
"cve": "CVE-2025-43314",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43314"
},
{
"cve": "CVE-2025-43315",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43315"
},
{
"cve": "CVE-2025-43316",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43316"
},
{
"cve": "CVE-2025-43317",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43317"
},
{
"cve": "CVE-2025-43318",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43318"
},
{
"cve": "CVE-2025-43319",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43319"
},
{
"cve": "CVE-2025-43321",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43321"
},
{
"cve": "CVE-2025-43325",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43325"
},
{
"cve": "CVE-2025-43326",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43326"
},
{
"cve": "CVE-2025-43327",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43327"
},
{
"cve": "CVE-2025-43328",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43328"
},
{
"cve": "CVE-2025-43329",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43329"
},
{
"cve": "CVE-2025-43330",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43330"
},
{
"cve": "CVE-2025-43331",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43331"
},
{
"cve": "CVE-2025-43332",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43332"
},
{
"cve": "CVE-2025-43333",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43333"
},
{
"cve": "CVE-2025-43337",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43337"
},
{
"cve": "CVE-2025-43340",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43340"
},
{
"cve": "CVE-2025-43341",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43341"
},
{
"cve": "CVE-2025-43342",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43342"
},
{
"cve": "CVE-2025-43343",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43343"
},
{
"cve": "CVE-2025-43344",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43344"
},
{
"cve": "CVE-2025-43346",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43346"
},
{
"cve": "CVE-2025-43347",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43347"
},
{
"cve": "CVE-2025-43349",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43349"
},
{
"cve": "CVE-2025-43353",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43353"
},
{
"cve": "CVE-2025-43354",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43354"
},
{
"cve": "CVE-2025-43355",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43355"
},
{
"cve": "CVE-2025-43356",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43356"
},
{
"cve": "CVE-2025-43357",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43357"
},
{
"cve": "CVE-2025-43358",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43358"
},
{
"cve": "CVE-2025-43359",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43359"
},
{
"cve": "CVE-2025-43366",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43366"
},
{
"cve": "CVE-2025-43367",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43367"
},
{
"cve": "CVE-2025-43368",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43368"
},
{
"cve": "CVE-2025-43369",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43369"
},
{
"cve": "CVE-2025-43372",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-43372"
},
{
"cve": "CVE-2025-6965",
"product_status": {
"known_affected": [
"T047016",
"T047014",
"T047015"
]
},
"release_date": "2025-09-15T22:00:00.000+00:00",
"title": "CVE-2025-6965"
}
]
}
wid-sec-w-2025-1646
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler oder entfernter authentisierter Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um beliebigen Code auszuf\u00fchren oder andere nicht spezifizierte Effekte zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1646 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1646.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1646 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1646"
},
{
"category": "external",
"summary": "RedHat Security Advisory vom 2025-07-27",
"url": "https://access.redhat.com/errata/RHSA-2025:11803"
},
{
"category": "external",
"summary": "RedHat Security Advisory vom 2025-07-27",
"url": "https://access.redhat.com/errata/RHSA-2025:11805"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11933 vom 2025-07-28",
"url": "https://access.redhat.com/errata/RHSA-2025:11933"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-11803 vom 2025-07-28",
"url": "https://linux.oracle.com/errata/ELSA-2025-11803.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7676-1 vom 2025-07-28",
"url": "https://ubuntu.com/security/notices/USN-7676-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11992 vom 2025-07-28",
"url": "https://access.redhat.com/errata/RHSA-2025:11992"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12010 vom 2025-07-29",
"url": "https://access.redhat.com/errata/RHSA-2025:12010"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12036 vom 2025-07-29",
"url": "https://access.redhat.com/errata/RHSA-2025:12036"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-11992 vom 2025-07-29",
"url": "https://linux.oracle.com/errata/ELSA-2025-11992.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-12010 vom 2025-07-29",
"url": "https://linux.oracle.com/errata/ELSA-2025-12010.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-11933 vom 2025-07-29",
"url": "https://linux.oracle.com/errata/ELSA-2025-11933.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12349 vom 2025-07-31",
"url": "https://access.redhat.com/errata/RHSA-2025:12349"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-11802 vom 2025-07-30",
"url": "http://linux.oracle.com/errata/ELSA-2025-11802.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7679-1 vom 2025-07-30",
"url": "https://ubuntu.com/security/notices/USN-7679-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12521 vom 2025-08-04",
"url": "https://access.redhat.com/errata/RHSA-2025:12521"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-2949 vom 2025-08-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2949.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12749 vom 2025-08-04",
"url": "https://access.redhat.com/errata/RHSA-2025:12749"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12522 vom 2025-08-05",
"url": "https://access.redhat.com/errata/RHSA-2025:12522"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02672-1 vom 2025-08-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3MKD7BSPQBWIRKKAIW2QSG7MGMUN3I7U/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12904 vom 2025-08-05",
"url": "https://access.redhat.com/errata/RHSA-2025:12904"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12905 vom 2025-08-05",
"url": "https://access.redhat.com/errata/RHSA-2025:12905"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12901 vom 2025-08-05",
"url": "https://access.redhat.com/errata/RHSA-2025:12901"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-12349 vom 2025-08-07",
"url": "http://linux.oracle.com/errata/ELSA-2025-12349.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13335 vom 2025-08-07",
"url": "https://access.redhat.com/errata/RHSA-2025:13335"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14101 vom 2025-08-19",
"url": "https://access.redhat.com/errata/RHSA-2025:14101"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-2973 vom 2025-08-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2973.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7243787 vom 2025-09-02",
"url": "https://www.ibm.com/support/pages/node/7243787"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-2978 vom 2025-09-04",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2978.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7244160 vom 2025-09-05",
"url": "https://www.ibm.com/support/pages/node/7244160"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20674-1 vom 2025-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-September/022477.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15828 vom 2025-09-15",
"url": "https://access.redhat.com/errata/RHSA-2025:15828"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15827 vom 2025-09-15",
"url": "https://access.redhat.com/errata/RHSA-2025:15827"
},
{
"category": "external",
"summary": "cPanel 132 Change Log vom 2025-10-01",
"url": "https://docs.cpanel.net/changelogs/132-change-log/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18219 vom 2025-10-16",
"url": "https://access.redhat.com/errata/RHSA-2025:18219"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18217 vom 2025-10-22",
"url": "https://access.redhat.com/errata/RHSA-2025:18217"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18218 vom 2025-10-22",
"url": "https://access.redhat.com/errata/RHSA-2025:18218"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15397 vom 2025-10-22",
"url": "https://access.redhat.com/errata/RHSA-2025:15397"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7249276 vom 2025-10-27",
"url": "https://www.ibm.com/support/pages/node/7249276"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19046 vom 2025-10-29",
"url": "https://access.redhat.com/errata/RHSA-2025:19046"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19041 vom 2025-10-30",
"url": "https://access.redhat.com/errata/RHSA-2025:19041"
}
],
"source_lang": "en-US",
"title": "Red Hat Enterprise Linux (nodejs, perl): Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-10-29T23:00:00.000+00:00",
"generator": {
"date": "2025-10-30T08:13:42.453+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1646",
"initial_release_date": "2025-07-27T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-07-27T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-07-28T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat, Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2025-07-29T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-07-30T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat, Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2025-08-03T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Amazon und Red Hat aufgenommen"
},
{
"date": "2025-08-05T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-06T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-07T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat und Amazon aufgenommen"
},
{
"date": "2025-09-02T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-09-04T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-09-07T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-09-10T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-15T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-30T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-10-16T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-10-28T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-29T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "21"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM App Connect Enterprise",
"product": {
"name": "IBM App Connect Enterprise",
"product_id": "T032495",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:app_connect_enterprise:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Operator",
"product": {
"name": "IBM MQ Operator",
"product_id": "T036688",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:mq:operator"
}
}
},
{
"category": "product_version",
"name": "Container",
"product": {
"name": "IBM MQ Container",
"product_id": "T040640",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:mq:container"
}
}
}
],
"category": "product_name",
"name": "MQ"
},
{
"category": "product_name",
"name": "IBM QRadar SIEM",
"product": {
"name": "IBM QRadar SIEM",
"product_id": "T021415",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:-"
}
}
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "8",
"product": {
"name": "Red Hat Enterprise Linux 8",
"product_id": "T045679",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8"
}
}
},
{
"category": "product_version",
"name": "9",
"product": {
"name": "Red Hat Enterprise Linux 9",
"product_id": "T045680",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Container Platform \u003c4.18.27",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.18.27",
"product_id": "T048184"
}
},
{
"category": "product_version",
"name": "Container Platform 4.18.27",
"product": {
"name": "Red Hat OpenShift Container Platform 4.18.27",
"product_id": "T048184-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.18.27"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c132.0.0",
"product": {
"name": "cPanel cPanel/WHM \u003c132.0.0",
"product_id": "T047273"
}
},
{
"category": "product_version",
"name": "132.0.0",
"product": {
"name": "cPanel cPanel/WHM 132.0.0",
"product_id": "T047273-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:cpanel:cpanel_whm:132.0.0"
}
}
}
],
"category": "product_name",
"name": "cPanel/WHM"
}
],
"category": "vendor",
"name": "cPanel"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-40909",
"product_status": {
"known_affected": [
"67646",
"T047273",
"T048184",
"T036688",
"T004914",
"T032495",
"T045679",
"T002207",
"T000126",
"T021415",
"T045680",
"398363",
"T040640"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-40909"
},
{
"cve": "CVE-2025-6965",
"product_status": {
"known_affected": [
"67646",
"T047273",
"T048184",
"T036688",
"T004914",
"T032495",
"T045679",
"T002207",
"T000126",
"T021415",
"T045680",
"398363",
"T040640"
]
},
"release_date": "2025-07-27T22:00:00.000+00:00",
"title": "CVE-2025-6965"
}
]
}
fkie_cve-2025-40909
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| 9b29abf9-4ab0-4765-b253-1875cd9b441e | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226 | ||
| 9b29abf9-4ab0-4765-b253-1875cd9b441e | https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e | ||
| 9b29abf9-4ab0-4765-b253-1875cd9b441e | https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch | ||
| 9b29abf9-4ab0-4765-b253-1875cd9b441e | https://github.com/Perl/perl5/issues/10387 | ||
| 9b29abf9-4ab0-4765-b253-1875cd9b441e | https://github.com/Perl/perl5/issues/23010 | ||
| 9b29abf9-4ab0-4765-b253-1875cd9b441e | https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads | ||
| 9b29abf9-4ab0-4765-b253-1875cd9b441e | https://www.openwall.com/lists/oss-security/2025/05/22/2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2025/Sep/53 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2025/Sep/54 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2025/Sep/55 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/05/23/1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/05/30/4 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/06/02/2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/06/02/5 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/06/02/6 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/06/02/7 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/06/03/1 |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Perl threads have a working directory race condition where file operations may target unintended paths.\n\nIf a directory handle is open at thread creation, the process-wide current working directory is temporarily changed in order to clone\u00a0that handle for the new thread, which is visible from any third (or\u00a0more) thread already running. \n\nThis may lead to unintended operations\u00a0such as loading code or accessing files from unexpected locations,\u00a0which a local attacker may be able to exploit.\n\nThe bug was introduced in commit\u00a011a11ecf4bea72b17d250cfb43c897be1341861e and released in Perl version 5.13.6"
},
{
"lang": "es",
"value": "Los subprocesos de Perl tienen una condici\u00f3n de ejecuci\u00f3n en el directorio de trabajo donde las operaciones con archivos pueden dirigirse a rutas no deseadas. Si un identificador de directorio est\u00e1 abierto al crear el subproceso, el directorio de trabajo actual de todo el proceso se modifica temporalmente para clonar dicho identificador para el nuevo subproceso, visible desde cualquier tercer subproceso (o m\u00e1s) en ejecuci\u00f3n. Esto puede provocar operaciones no deseadas, como la carga de c\u00f3digo o el acceso a archivos desde ubicaciones inesperadas, que un atacante local podr\u00eda explotar. El error se introdujo en el commit 11a11ecf4bea72b17d250cfb43c897be1341861e y se public\u00f3 en la versi\u00f3n 5.13.6 de Perl."
}
],
"id": "CVE-2025-40909",
"lastModified": "2025-11-03T19:15:52.563",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.5,
"impactScore": 3.4,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-05-30T13:15:22.350",
"references": [
{
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1098226"
},
{
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"url": "https://github.com/Perl/perl5/commit/11a11ecf4bea72b17d250cfb43c897be1341861e"
},
{
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"url": "https://github.com/Perl/perl5/commit/918bfff86ca8d6d4e4ec5b30994451e0bd74aba9.patch"
},
{
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"url": "https://github.com/Perl/perl5/issues/10387"
},
{
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"url": "https://github.com/Perl/perl5/issues/23010"
},
{
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"url": "https://perldoc.perl.org/5.14.0/perl5136delta#Directory-handles-not-copied-to-threads"
},
{
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"url": "https://www.openwall.com/lists/oss-security/2025/05/22/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Sep/53"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Sep/54"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Sep/55"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2025/05/23/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2025/05/30/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2025/06/02/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2025/06/02/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2025/06/02/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2025/06/02/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/1"
}
],
"sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-426"
},
{
"lang": "en",
"value": "CWE-689"
}
],
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
"type": "Secondary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.