Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-71238 (GCVE-0-2025-71238)
Vulnerability from cvelistv5 – Published: 2026-03-04 14:36 – Updated: 2026-03-08 10:07| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Linux | Linux |
Affected:
1b81e7f3019d632a707e07927e946ffbbc102910 , < 057a5bdc481e58ab853117254867ffb22caf9f6e
(git)
Affected: 1b81e7f3019d632a707e07927e946ffbbc102910 , < f2bbb4db0e4a4fbd5e649c0b5d8733f61da24720 (git) Affected: 1b81e7f3019d632a707e07927e946ffbbc102910 , < 27ac9679c43a09e54e2d9aae9980ada045b428e0 (git) Affected: 1b81e7f3019d632a707e07927e946ffbbc102910 , < 74e7458537cd9349cf019862e51491f670871707 (git) Affected: 1b81e7f3019d632a707e07927e946ffbbc102910 , < 871f6236da96c4a9712b8a29d7f555f767a47e95 (git) Affected: 1b81e7f3019d632a707e07927e946ffbbc102910 , < 31f33b856d2324d86bcaef295f4d210477a1c018 (git) Affected: 1b81e7f3019d632a707e07927e946ffbbc102910 , < 708003e1bc857dd014d4c44278d7d77c26f91b1c (git) Affected: 1b81e7f3019d632a707e07927e946ffbbc102910 , < c2c68225b1456f4d0d393b5a8778d51bb0d5b1d0 (git) |
|||||||
|
|||||||||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/scsi/qla2xxx/qla_bsg.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "057a5bdc481e58ab853117254867ffb22caf9f6e",
"status": "affected",
"version": "1b81e7f3019d632a707e07927e946ffbbc102910",
"versionType": "git"
},
{
"lessThan": "f2bbb4db0e4a4fbd5e649c0b5d8733f61da24720",
"status": "affected",
"version": "1b81e7f3019d632a707e07927e946ffbbc102910",
"versionType": "git"
},
{
"lessThan": "27ac9679c43a09e54e2d9aae9980ada045b428e0",
"status": "affected",
"version": "1b81e7f3019d632a707e07927e946ffbbc102910",
"versionType": "git"
},
{
"lessThan": "74e7458537cd9349cf019862e51491f670871707",
"status": "affected",
"version": "1b81e7f3019d632a707e07927e946ffbbc102910",
"versionType": "git"
},
{
"lessThan": "871f6236da96c4a9712b8a29d7f555f767a47e95",
"status": "affected",
"version": "1b81e7f3019d632a707e07927e946ffbbc102910",
"versionType": "git"
},
{
"lessThan": "31f33b856d2324d86bcaef295f4d210477a1c018",
"status": "affected",
"version": "1b81e7f3019d632a707e07927e946ffbbc102910",
"versionType": "git"
},
{
"lessThan": "708003e1bc857dd014d4c44278d7d77c26f91b1c",
"status": "affected",
"version": "1b81e7f3019d632a707e07927e946ffbbc102910",
"versionType": "git"
},
{
"lessThan": "c2c68225b1456f4d0d393b5a8778d51bb0d5b1d0",
"status": "affected",
"version": "1b81e7f3019d632a707e07927e946ffbbc102910",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/scsi/qla2xxx/qla_bsg.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "5.7"
},
{
"lessThan": "5.7",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.10.*",
"status": "unaffected",
"version": "5.10.251",
"versionType": "semver"
},
{
"lessThanOrEqual": "5.15.*",
"status": "unaffected",
"version": "5.15.201",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.1.*",
"status": "unaffected",
"version": "6.1.164",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"version": "6.6.127",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.74",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.18.*",
"status": "unaffected",
"version": "6.18.13",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.19.*",
"status": "unaffected",
"version": "6.19.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "7.0-rc1",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.251",
"versionStartIncluding": "5.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.201",
"versionStartIncluding": "5.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.164",
"versionStartIncluding": "5.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.127",
"versionStartIncluding": "5.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.74",
"versionStartIncluding": "5.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.13",
"versionStartIncluding": "5.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19.3",
"versionStartIncluding": "5.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.0-rc1",
"versionStartIncluding": "5.7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix bsg_done() causing double free\n\nKernel panic observed on system,\n\n[5353358.825191] BUG: unable to handle page fault for address: ff5f5e897b024000\n[5353358.825194] #PF: supervisor write access in kernel mode\n[5353358.825195] #PF: error_code(0x0002) - not-present page\n[5353358.825196] PGD 100006067 P4D 0\n[5353358.825198] Oops: 0002 [#1] PREEMPT SMP NOPTI\n[5353358.825200] CPU: 5 PID: 2132085 Comm: qlafwupdate.sub Kdump: loaded Tainted: G W L ------- --- 5.14.0-503.34.1.el9_5.x86_64 #1\n[5353358.825203] Hardware name: HPE ProLiant DL360 Gen11/ProLiant DL360 Gen11, BIOS 2.44 01/17/2025\n[5353358.825204] RIP: 0010:memcpy_erms+0x6/0x10\n[5353358.825211] RSP: 0018:ff591da8f4f6b710 EFLAGS: 00010246\n[5353358.825212] RAX: ff5f5e897b024000 RBX: 0000000000007090 RCX: 0000000000001000\n[5353358.825213] RDX: 0000000000001000 RSI: ff591da8f4fed090 RDI: ff5f5e897b024000\n[5353358.825214] RBP: 0000000000010000 R08: ff5f5e897b024000 R09: 0000000000000000\n[5353358.825215] R10: ff46cf8c40517000 R11: 0000000000000001 R12: 0000000000008090\n[5353358.825216] R13: ff591da8f4f6b720 R14: 0000000000001000 R15: 0000000000000000\n[5353358.825218] FS: 00007f1e88d47740(0000) GS:ff46cf935f940000(0000) knlGS:0000000000000000\n[5353358.825219] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[5353358.825220] CR2: ff5f5e897b024000 CR3: 0000000231532004 CR4: 0000000000771ef0\n[5353358.825221] PKRU: 55555554\n[5353358.825222] Call Trace:\n[5353358.825223] \u003cTASK\u003e\n[5353358.825224] ? show_trace_log_lvl+0x1c4/0x2df\n[5353358.825229] ? show_trace_log_lvl+0x1c4/0x2df\n[5353358.825232] ? sg_copy_buffer+0xc8/0x110\n[5353358.825236] ? __die_body.cold+0x8/0xd\n[5353358.825238] ? page_fault_oops+0x134/0x170\n[5353358.825242] ? kernelmode_fixup_or_oops+0x84/0x110\n[5353358.825244] ? exc_page_fault+0xa8/0x150\n[5353358.825247] ? asm_exc_page_fault+0x22/0x30\n[5353358.825252] ? memcpy_erms+0x6/0x10\n[5353358.825253] sg_copy_buffer+0xc8/0x110\n[5353358.825259] qla2x00_process_vendor_specific+0x652/0x1320 [qla2xxx]\n[5353358.825317] qla24xx_bsg_request+0x1b2/0x2d0 [qla2xxx]\n\nMost routines in qla_bsg.c call bsg_done() only for success cases.\nHowever a few invoke it for failure case as well leading to a double\nfree. Validate before calling bsg_done()."
}
],
"providerMetadata": {
"dateUpdated": "2026-03-08T10:07:31.408Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/057a5bdc481e58ab853117254867ffb22caf9f6e"
},
{
"url": "https://git.kernel.org/stable/c/f2bbb4db0e4a4fbd5e649c0b5d8733f61da24720"
},
{
"url": "https://git.kernel.org/stable/c/27ac9679c43a09e54e2d9aae9980ada045b428e0"
},
{
"url": "https://git.kernel.org/stable/c/74e7458537cd9349cf019862e51491f670871707"
},
{
"url": "https://git.kernel.org/stable/c/871f6236da96c4a9712b8a29d7f555f767a47e95"
},
{
"url": "https://git.kernel.org/stable/c/31f33b856d2324d86bcaef295f4d210477a1c018"
},
{
"url": "https://git.kernel.org/stable/c/708003e1bc857dd014d4c44278d7d77c26f91b1c"
},
{
"url": "https://git.kernel.org/stable/c/c2c68225b1456f4d0d393b5a8778d51bb0d5b1d0"
}
],
"title": "scsi: qla2xxx: Fix bsg_done() causing double free",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2025-71238",
"datePublished": "2026-03-04T14:36:36.579Z",
"dateReserved": "2026-02-18T14:25:13.845Z",
"dateUpdated": "2026-03-08T10:07:31.408Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-71238\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-03-04T15:16:12.700\",\"lastModified\":\"2026-03-17T21:21:58.760\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nscsi: qla2xxx: Fix bsg_done() causing double free\\n\\nKernel panic observed on system,\\n\\n[5353358.825191] BUG: unable to handle page fault for address: ff5f5e897b024000\\n[5353358.825194] #PF: supervisor write access in kernel mode\\n[5353358.825195] #PF: error_code(0x0002) - not-present page\\n[5353358.825196] PGD 100006067 P4D 0\\n[5353358.825198] Oops: 0002 [#1] PREEMPT SMP NOPTI\\n[5353358.825200] CPU: 5 PID: 2132085 Comm: qlafwupdate.sub Kdump: loaded Tainted: G W L ------- --- 5.14.0-503.34.1.el9_5.x86_64 #1\\n[5353358.825203] Hardware name: HPE ProLiant DL360 Gen11/ProLiant DL360 Gen11, BIOS 2.44 01/17/2025\\n[5353358.825204] RIP: 0010:memcpy_erms+0x6/0x10\\n[5353358.825211] RSP: 0018:ff591da8f4f6b710 EFLAGS: 00010246\\n[5353358.825212] RAX: ff5f5e897b024000 RBX: 0000000000007090 RCX: 0000000000001000\\n[5353358.825213] RDX: 0000000000001000 RSI: ff591da8f4fed090 RDI: ff5f5e897b024000\\n[5353358.825214] RBP: 0000000000010000 R08: ff5f5e897b024000 R09: 0000000000000000\\n[5353358.825215] R10: ff46cf8c40517000 R11: 0000000000000001 R12: 0000000000008090\\n[5353358.825216] R13: ff591da8f4f6b720 R14: 0000000000001000 R15: 0000000000000000\\n[5353358.825218] FS: 00007f1e88d47740(0000) GS:ff46cf935f940000(0000) knlGS:0000000000000000\\n[5353358.825219] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\\n[5353358.825220] CR2: ff5f5e897b024000 CR3: 0000000231532004 CR4: 0000000000771ef0\\n[5353358.825221] PKRU: 55555554\\n[5353358.825222] Call Trace:\\n[5353358.825223] \u003cTASK\u003e\\n[5353358.825224] ? show_trace_log_lvl+0x1c4/0x2df\\n[5353358.825229] ? show_trace_log_lvl+0x1c4/0x2df\\n[5353358.825232] ? sg_copy_buffer+0xc8/0x110\\n[5353358.825236] ? __die_body.cold+0x8/0xd\\n[5353358.825238] ? page_fault_oops+0x134/0x170\\n[5353358.825242] ? kernelmode_fixup_or_oops+0x84/0x110\\n[5353358.825244] ? exc_page_fault+0xa8/0x150\\n[5353358.825247] ? asm_exc_page_fault+0x22/0x30\\n[5353358.825252] ? memcpy_erms+0x6/0x10\\n[5353358.825253] sg_copy_buffer+0xc8/0x110\\n[5353358.825259] qla2x00_process_vendor_specific+0x652/0x1320 [qla2xxx]\\n[5353358.825317] qla24xx_bsg_request+0x1b2/0x2d0 [qla2xxx]\\n\\nMost routines in qla_bsg.c call bsg_done() only for success cases.\\nHowever a few invoke it for failure case as well leading to a double\\nfree. Validate before calling bsg_done().\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\\n\\nscsi: qla2xxx: Soluci\u00f3n para bsg_done() que causa doble liberaci\u00f3n\\n\\nKernel panic observado en el sistema,\\n\\n[5353358.825191] BUG: unable a handle page fault para address: ff5f5e897b024000\\n[5353358.825194] #PF: supervisor write access in kernel mode\\n[5353358.825195] #PF: error_code(0x0002) - not-present page\\n[5353358.825196] PGD 100006067 P4D 0\\n[5353358.825198] Oops: 0002 [#1] PREEMPT SMP NOPTI\\n[5353358.825200] CPU: 5 PID: 2132085 Comm: qlafwupdate.sub Kdump: loaded Tainted: G W L ------- --- 5.14.0-503.34.1.el9_5.x86_64 #1\\n[5353358.825203] Hardware name: HPE ProLiant DL360 Gen11/ProLiant DL360 Gen11, BIOS 2.44 01/17/2025\\n[5353358.825204] RIP: 0010:memcpy_erms+0x6/0x10\\n[5353358.825211] RSP: 0018:ff591da8f4f6b710 EFLAGS: 00010246\\n[5353358.825212] RAX: ff5f5e897b024000 RBX: 0000000000007090 RCX: 0000000000001000\\n[5353358.825213] RDX: 0000000000001000 RSI: ff591da8f4fed090 RDI: ff5f5e897b024000\\n[5353358.825214] RBP: 0000000000010000 R08: ff5f5e897b024000 R09: 0000000000000000\\n[5353358.825215] R10: ff46cf8c40517000 R11: 0000000000000001 R12: 0000000000008090\\n[5353358.825216] R13: ff591da8f4f6b720 R14: 0000000000001000 R15: 0000000000000000\\n[5353358.825218] FS: 00007f1e88d47740(0000) GS:ff46cf935f940000(0000) knlGS:0000000000000000\\n[5353358.825219] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\\n[5353358.825220] CR2: ff5f5e897b024000 CR3: 0000000231532004 CR4: 0000000000771ef0\\n[5353358.825221] PKRU: 55555554\\n[5353358.825222] Call Trace:\\n[5353358.825223] \\n[5353358.825224] ? show_trace_log_lvl+0x1c4/0x2df\\n[5353358.825229] ? show_trace_log_lvl+0x1c4/0x2df\\n[5353358.825232] ? sg_copy_buffer+0xc8/0x110\\n[5353358.825236] ? __die_body.cold+0x8/0xd\\n[5353358.825238] ? page_fault_oops+0x134/0x170\\n[5353358.825242] ? kernelmode_fixup_or_oops+0x84/0x110\\n[5353358.825244] ? exc_page_fault+0xa8/0x150\\n[5353358.825247] ? asm_exc_page_fault+0x22/0x30\\n[5353358.825252] ? memcpy_erms+0x6/0x10\\n[5353358.825253] sg_copy_buffer+0xc8/0x110\\n[5353358.825259] qla2x00_process_vendor_specific+0x652/0x1320 [qla2xxx]\\n[5353358.825317] qla24xx_bsg_request+0x1b2/0x2d0 [qla2xxx]\\n\\nLa mayor\u00eda de las rutinas en qla_bsg.c llaman a bsg_done() solo para casos de \u00e9xito. Sin embargo, algunas la invocan tambi\u00e9n para casos de fallo, lo que lleva a una doble liberaci\u00f3n. Validar antes de llamar a bsg_done().\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-415\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.7\",\"versionEndExcluding\":\"5.10.251\",\"matchCriteriaId\":\"05D10329-0F31-4D9E-ADDC-2675BCEEABBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.11\",\"versionEndExcluding\":\"5.15.201\",\"matchCriteriaId\":\"600A89ED-86F2-48D8-BB7C-5EE7A8832FC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.16\",\"versionEndExcluding\":\"6.1.164\",\"matchCriteriaId\":\"6892F74B-3F14-4500-9652-24A2ECB04144\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.2\",\"versionEndExcluding\":\"6.6.127\",\"matchCriteriaId\":\"4A9F36A3-A685-48A0-84B4-6217052BD058\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.7\",\"versionEndExcluding\":\"6.12.74\",\"matchCriteriaId\":\"C2968F55-D03F-42BE-A694-F0A37BC8CBE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.13\",\"versionEndExcluding\":\"6.18.13\",\"matchCriteriaId\":\"6BDEF9FB-423E-49F6-991B-9277CC3AF400\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.19\",\"versionEndExcluding\":\"6.19.3\",\"matchCriteriaId\":\"7853A337-FB2A-4E19-AB47-4E38343532AA\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/057a5bdc481e58ab853117254867ffb22caf9f6e\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/27ac9679c43a09e54e2d9aae9980ada045b428e0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/31f33b856d2324d86bcaef295f4d210477a1c018\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/708003e1bc857dd014d4c44278d7d77c26f91b1c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/74e7458537cd9349cf019862e51491f670871707\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/871f6236da96c4a9712b8a29d7f555f767a47e95\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/c2c68225b1456f4d0d393b5a8778d51bb0d5b1d0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f2bbb4db0e4a4fbd5e649c0b5d8733f61da24720\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
}
}
CERTFR-2026-AVI-0291
Vulnerability from certfr_avis - Published: 2026-03-13 - Updated: 2026-03-13
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian trixie versions ant\u00e9rieures \u00e0 6.12.74-2",
"product": {
"name": "Debian",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "Debian bookworm versions ant\u00e9rieures \u00e0 6.1.164-1",
"product": {
"name": "Debian",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-23198",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23198"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38201"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2026-23220",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23220"
},
{
"name": "CVE-2026-23187",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2026-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23222"
},
{
"name": "CVE-2026-23229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23229"
},
{
"name": "CVE-2026-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23209"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2026-23236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23236"
},
{
"name": "CVE-2025-71235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71235"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-71144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71144"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2023-53424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53424"
},
{
"name": "CVE-2026-23234",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23234"
},
{
"name": "CVE-2026-23230",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23230"
},
{
"name": "CVE-2026-23178",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23178"
},
{
"name": "CVE-2026-23228",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23228"
},
{
"name": "CVE-2026-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23169"
},
{
"name": "CVE-2025-71220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71220"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2026-23180",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23180"
},
{
"name": "CVE-2026-23216",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23216"
},
{
"name": "CVE-2026-23238",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23238"
},
{
"name": "CVE-2026-23176",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23176"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2025-71224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71224"
},
{
"name": "CVE-2026-23193",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23193"
},
{
"name": "CVE-2025-71237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71237"
},
{
"name": "CVE-2026-23221",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23221"
},
{
"name": "CVE-2026-23205",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23205"
},
{
"name": "CVE-2025-71222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71222"
},
{
"name": "CVE-2026-23237",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23237"
},
{
"name": "CVE-2025-71236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71236"
},
{
"name": "CVE-2026-23235",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23235"
},
{
"name": "CVE-2024-26822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26822"
},
{
"name": "CVE-2025-71232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71232"
},
{
"name": "CVE-2026-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23182"
},
{
"name": "CVE-2026-23233",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23233"
},
{
"name": "CVE-2026-23206",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23206"
},
{
"name": "CVE-2024-57895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57895"
},
{
"name": "CVE-2026-23112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23112"
},
{
"name": "CVE-2026-23190",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23190"
},
{
"name": "CVE-2026-23100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23100"
},
{
"name": "CVE-2025-71233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71233"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2025-71238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71238"
}
],
"initial_release_date": "2026-03-13T00:00:00",
"last_revision_date": "2026-03-13T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0291",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Debian. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian",
"vendor_advisories": [
{
"published_at": "2026-03-12",
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-6163-1",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00071.html"
},
{
"published_at": "2026-03-12",
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-6162-1",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00072.html"
}
]
}
CERTFR-2026-AVI-0326
Vulnerability from certfr_avis - Published: 2026-03-20 - Updated: 2026-03-20
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 6.0.26+LTS-T | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.3.6 | ||
| VMware | Tanzu Platform | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.6.9 | ||
| VMware | N/A | Python Buildpack versions antérieures à 1.8.83 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 3.1.9 | ||
| VMware | Tanzu Platform | Tanzu RabbitMQ sur Tanzu Platform versions antérieures à 2.4.4 | ||
| VMware | N/A | PHP Buildpack versions antérieures à 4.6.69 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 3.2.5 | ||
| VMware | Tanzu Platform | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.9+LTS-T | ||
| VMware | Tanzu Platform | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.17 | ||
| VMware | Tanzu Platform | Tanzu RabbitMQ pour Tanzu Platform versions antérieures à 10.1.2 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 2.4.6 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 1.16.18 | ||
| VMware | Tanzu Platform | Tanzu for Valkey sur Tanzu Platform versions antérieures à 10.2.2 | ||
| VMware | Tanzu Platform | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 6.0.26+LTS-T | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.2.9+LTS-T | ||
| VMware | Tanzu Platform | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.3.6 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.26+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.6",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.6.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.83",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu RabbitMQ sur Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.4",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.69",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.5",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.9+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.17",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu RabbitMQ pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.2",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.6",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.18",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for Valkey sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.2",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.26+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.9+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.6",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-28422",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28422"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2024-35875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35875"
},
{
"name": "CVE-2022-50759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50759"
},
{
"name": "CVE-2026-26007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26007"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2024-49912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49912"
},
{
"name": "CVE-2024-36026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36026"
},
{
"name": "CVE-2026-23198",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23198"
},
{
"name": "CVE-2023-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3640"
},
{
"name": "CVE-2024-27435",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27435"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2024-42122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42122"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2026-28420",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28420"
},
{
"name": "CVE-2022-49069",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49069"
},
{
"name": "CVE-2024-57875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57875"
},
{
"name": "CVE-2022-27943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27943"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-54129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54129"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2025-39992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39992"
},
{
"name": "CVE-2025-69534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69534"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-49543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49543"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2023-53562",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53562"
},
{
"name": "CVE-2025-68324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68324"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2024-50063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50063"
},
{
"name": "CVE-2023-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33875"
},
{
"name": "CVE-2024-41001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41001"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2026-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23167"
},
{
"name": "CVE-2025-36353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36353"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2024-46770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46770"
},
{
"name": "CVE-2023-53247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53247"
},
{
"name": "CVE-2025-38042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38042"
},
{
"name": "CVE-2025-22083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22083"
},
{
"name": "CVE-2023-53829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53829"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-54002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54002"
},
{
"name": "CVE-2022-50550",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50550"
},
{
"name": "CVE-2022-0400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0400"
},
{
"name": "CVE-2022-49138",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49138"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2022-49359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49359"
},
{
"name": "CVE-2025-68342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68342"
},
{
"name": "CVE-2022-48673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48673"
},
{
"name": "CVE-2022-50425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50425"
},
{
"name": "CVE-2025-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38201"
},
{
"name": "CVE-2024-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39293"
},
{
"name": "CVE-2023-53008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53008"
},
{
"name": "CVE-2025-38669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38669"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2025-22107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
},
{
"name": "CVE-2024-38306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38306"
},
{
"name": "CVE-2023-53733",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53733"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2023-1386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1386"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-56703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
},
{
"name": "CVE-2026-23098",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23098"
},
{
"name": "CVE-2023-53347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53347"
},
{
"name": "CVE-2023-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28374"
},
{
"name": "CVE-2023-52926",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52926"
},
{
"name": "CVE-2026-32597",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32597"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2026-25500",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25500"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27558"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2021-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0076"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2024-58237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58237"
},
{
"name": "CVE-2024-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36909"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2023-53529",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53529"
},
{
"name": "CVE-2024-50028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50028"
},
{
"name": "CVE-2023-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53042"
},
{
"name": "CVE-2022-50527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50527"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-58094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2025-52534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52534"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2024-46705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46705"
},
{
"name": "CVE-2022-50407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50407"
},
{
"name": "CVE-2026-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23196"
},
{
"name": "CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"name": "CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"name": "CVE-2024-45775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45775"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2022-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49901"
},
{
"name": "CVE-2026-23126",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23126"
},
{
"name": "CVE-2025-38329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38329"
},
{
"name": "CVE-2021-33096",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33096"
},
{
"name": "CVE-2022-50230",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50230"
},
{
"name": "CVE-2024-35949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
},
{
"name": "CVE-2025-39947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39947"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2023-53588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53588"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2023-53685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53685"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2026-23054",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23054"
},
{
"name": "CVE-2025-37870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37870"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2022-49533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49533"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2020-26557",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26557"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2021-33114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33114"
},
{
"name": "CVE-2025-69645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69645"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2022-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49125"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2024-26866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26866"
},
{
"name": "CVE-2024-27010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2023-52561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52561"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2024-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53221"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"name": "CVE-2026-24734",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24734"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2024-35878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35878"
},
{
"name": "CVE-2023-53362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53362"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2024-26756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26756"
},
{
"name": "CVE-2022-50815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50815"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-39826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39826"
},
{
"name": "CVE-2025-38036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38036"
},
{
"name": "CVE-2025-2668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2668"
},
{
"name": "CVE-2025-71221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71221"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2024-46860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46860"
},
{
"name": "CVE-2025-22040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22040"
},
{
"name": "CVE-2024-53095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53095"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2024-56665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56665"
},
{
"name": "CVE-2025-38340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38340"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-53629",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53629"
},
{
"name": "CVE-2022-50178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50178"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2023-7216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7216"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2025-37880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37880"
},
{
"name": "CVE-2025-36427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36427"
},
{
"name": "CVE-2026-23217",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23217"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-37833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37833"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53320"
},
{
"name": "CVE-2024-44961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44961"
},
{
"name": "CVE-2026-23069",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23069"
},
{
"name": "CVE-2025-21656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21656"
},
{
"name": "CVE-2024-46835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46835"
},
{
"name": "CVE-2025-69650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69650"
},
{
"name": "CVE-2022-50554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50554"
},
{
"name": "CVE-2023-53509",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53509"
},
{
"name": "CVE-2023-53421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53421"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2024-52005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52005"
},
{
"name": "CVE-2024-46775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46775"
},
{
"name": "CVE-2025-39764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39764"
},
{
"name": "CVE-2025-38207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38207"
},
{
"name": "CVE-2022-49465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49465"
},
{
"name": "CVE-2026-23004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23004"
},
{
"name": "CVE-2024-26807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26807"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-49742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49742"
},
{
"name": "CVE-2025-71191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71191"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2025-68364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68364"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2026-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1965"
},
{
"name": "CVE-2024-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52560"
},
{
"name": "CVE-2024-56604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56604"
},
{
"name": "CVE-2026-23227",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23227"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-52653",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2023-52508",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52508"
},
{
"name": "CVE-2025-69647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69647"
},
{
"name": "CVE-2025-39827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39827"
},
{
"name": "CVE-2024-50014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50014"
},
{
"name": "CVE-2022-49108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49108"
},
{
"name": "CVE-2024-56677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56677"
},
{
"name": "CVE-2025-38717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38717"
},
{
"name": "CVE-2026-3497",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3497"
},
{
"name": "CVE-2025-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22019"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2024-26767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26767"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2026-2219",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2219"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2024-35926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35926"
},
{
"name": "CVE-2024-27389",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27389"
},
{
"name": "CVE-2024-26983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26983"
},
{
"name": "CVE-2022-50627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50627"
},
{
"name": "CVE-2024-50285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50285"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38029"
},
{
"name": "CVE-2022-49123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49123"
},
{
"name": "CVE-2024-50289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50289"
},
{
"name": "CVE-2023-53258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53258"
},
{
"name": "CVE-2024-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46813"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47658"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2025-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38096"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2023-53429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53429"
},
{
"name": "CVE-2024-46765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46765"
},
{
"name": "CVE-2022-50380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50380"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2022-48990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48990"
},
{
"name": "CVE-2024-24864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24864"
},
{
"name": "CVE-2024-35832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35832"
},
{
"name": "CVE-2024-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36479"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2026-23220",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23220"
},
{
"name": "CVE-2024-45782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45782"
},
{
"name": "CVE-2022-50785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50785"
},
{
"name": "CVE-2025-39745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39745"
},
{
"name": "CVE-2024-35799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35799"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2026-23020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23020"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-71223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71223"
},
{
"name": "CVE-2025-36098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36098"
},
{
"name": "CVE-2025-68796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68796"
},
{
"name": "CVE-2025-40016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40016"
},
{
"name": "CVE-2023-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53765"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2023-53325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53325"
},
{
"name": "CVE-2025-21752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21752"
},
{
"name": "CVE-2026-27138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27138"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-68220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68220"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-39282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39282"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2024-40975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40975"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2023-46316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46316"
},
{
"name": "CVE-2024-47866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47866"
},
{
"name": "CVE-2024-44970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44970"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2026-23208",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23208"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-39925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39925"
},
{
"name": "CVE-2025-68769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68769"
},
{
"name": "CVE-2024-50286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50286"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-68794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68794"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2022-48667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48667"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2024-56744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56744"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2026-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3783"
},
{
"name": "CVE-2022-49161",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49161"
},
{
"name": "CVE-2021-21240",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21240"
},
{
"name": "CVE-2022-48771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48771"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-23131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
},
{
"name": "CVE-2024-27400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27400"
},
{
"name": "CVE-2023-52485",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52485"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2022-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49997"
},
{
"name": "CVE-2022-49469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49469"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2026-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23179"
},
{
"name": "CVE-2025-68334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68334"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2022-0480",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0480"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2024-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49932"
},
{
"name": "CVE-2026-23090",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23090"
},
{
"name": "CVE-2026-23035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23035"
},
{
"name": "CVE-2023-53209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53209"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
},
{
"name": "CVE-2025-1272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1272"
},
{
"name": "CVE-2025-21658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21658"
},
{
"name": "CVE-2022-49651",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49651"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2024-26770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26770"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2024-27041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27041"
},
{
"name": "CVE-2025-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36184"
},
{
"name": "CVE-2026-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3195"
},
{
"name": "CVE-2025-37743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37743"
},
{
"name": "CVE-2025-40005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40005"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2023-26242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26242"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-52673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52673"
},
{
"name": "CVE-2024-56722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56722"
},
{
"name": "CVE-2021-33113",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33113"
},
{
"name": "CVE-2022-48668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48668"
},
{
"name": "CVE-2024-27418",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27418"
},
{
"name": "CVE-2025-68231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68231"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2025-14177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14177"
},
{
"name": "CVE-2026-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23064"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-68806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68806"
},
{
"name": "CVE-2022-50322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50322"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2022-27635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27635"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2024-49922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49922"
},
{
"name": "CVE-2020-12317",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12317"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2024-49909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49909"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2026-2391",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2391"
},
{
"name": "CVE-2021-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4095"
},
{
"name": "CVE-2022-50240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50240"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2024-45015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45015"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-71074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71074"
},
{
"name": "CVE-2025-38673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38673"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-11234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11234"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2026-23061",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23061"
},
{
"name": "CVE-2023-53447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53447"
},
{
"name": "CVE-2024-46754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46754"
},
{
"name": "CVE-2021-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0161"
},
{
"name": "CVE-2018-1121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1121"
},
{
"name": "CVE-2022-49547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49547"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2025-0622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0622"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-26757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26757"
},
{
"name": "CVE-2024-49899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49899"
},
{
"name": "CVE-2022-49484",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49484"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"name": "CVE-2023-53248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53248"
},
{
"name": "CVE-2024-56788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56788"
},
{
"name": "CVE-2016-8660",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8660"
},
{
"name": "CVE-2024-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26691"
},
{
"name": "CVE-2026-23047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23047"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-7519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7519"
},
{
"name": "CVE-2023-53491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53491"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-49908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49908"
},
{
"name": "CVE-2025-68265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68265"
},
{
"name": "CVE-2024-50048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50048"
},
{
"name": "CVE-2026-28421",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28421"
},
{
"name": "CVE-2026-23119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23119"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2026-27171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27171"
},
{
"name": "CVE-2022-50811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50811"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2023-4133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4133"
},
{
"name": "CVE-2024-50183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50183"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2023-53366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53366"
},
{
"name": "CVE-2022-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49910"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2022-49203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49203"
},
{
"name": "CVE-2024-40918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40918"
},
{
"name": "CVE-2024-27032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27032"
},
{
"name": "CVE-2022-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50236"
},
{
"name": "CVE-2024-35932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35932"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2026-23137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23137"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2025-37882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37882"
},
{
"name": "CVE-2024-35971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35971"
},
{
"name": "CVE-2024-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46762"
},
{
"name": "CVE-2023-34983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34983"
},
{
"name": "CVE-2024-35868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35868"
},
{
"name": "CVE-2023-53323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53323"
},
{
"name": "CVE-2026-3731",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3731"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2026-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23222"
},
{
"name": "CVE-2025-68229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68229"
},
{
"name": "CVE-2023-52857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52857"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2022-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50304"
},
{
"name": "CVE-2026-23226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23226"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2024-43844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43844"
},
{
"name": "CVE-2023-52920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52920"
},
{
"name": "CVE-2023-52590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52590"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2026-23049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23049"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2021-0072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0072"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-69652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69652"
},
{
"name": "CVE-2025-21635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21635"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38353"
},
{
"name": "CVE-2025-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36009"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2023-52761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52761"
},
{
"name": "CVE-2022-49773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49773"
},
{
"name": "CVE-2023-53609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53609"
},
{
"name": "CVE-2023-53478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53478"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2023-53682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53682"
},
{
"name": "CVE-2026-23229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23229"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-54770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54770"
},
{
"name": "CVE-2026-3442",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3442"
},
{
"name": "CVE-2024-58238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58238"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-22039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22039"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39933"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2022-49722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49722"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2025-68780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68780"
},
{
"name": "CVE-2024-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35945"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-53780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53780"
},
{
"name": "CVE-2020-35501",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35501"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2023-52624",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52624"
},
{
"name": "CVE-2024-56557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56557"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2023-52632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52632"
},
{
"name": "CVE-2024-46836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46836"
},
{
"name": "CVE-2026-23101",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23101"
},
{
"name": "CVE-2026-23099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23099"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2025-55130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55130"
},
{
"name": "CVE-2025-36070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36070"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-38105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38105"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2023-53198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53198"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2025-71121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71121"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2022-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50234"
},
{
"name": "CVE-2025-38082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38082"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-49934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49934"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2026-23066",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23066"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2023-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4969"
},
{
"name": "CVE-2024-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50098"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-53789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53789"
},
{
"name": "CVE-2022-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49858"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-36428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36428"
},
{
"name": "CVE-2023-53520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53520"
},
{
"name": "CVE-2026-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23085"
},
{
"name": "CVE-2023-52737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52737"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2026-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23209"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2024-35803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35803"
},
{
"name": "CVE-2025-22105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
},
{
"name": "CVE-2024-8612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8612"
},
{
"name": "CVE-2023-52586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52586"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2021-33110",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33110"
},
{
"name": "CVE-2025-37834",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37834"
},
{
"name": "CVE-2025-21833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2019-19378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19378"
},
{
"name": "CVE-2026-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23150"
},
{
"name": "CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2025-71073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71073"
},
{
"name": "CVE-2025-38426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38426"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2024-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36911"
},
{
"name": "CVE-2025-55131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55131"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2026-23236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23236"
},
{
"name": "CVE-2023-53068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53068"
},
{
"name": "CVE-2025-22090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2021-31615",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31615"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2022-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49932"
},
{
"name": "CVE-2022-25837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25837"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2024-49939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49939"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2024-49905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49905"
},
{
"name": "CVE-2023-52831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52831"
},
{
"name": "CVE-2023-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53221"
},
{
"name": "CVE-2024-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26719"
},
{
"name": "CVE-2022-44034",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44034"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53072"
},
{
"name": "CVE-2023-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2007"
},
{
"name": "CVE-2022-37341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37341"
},
{
"name": "CVE-2025-69648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69648"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2024-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50298"
},
{
"name": "CVE-2025-36424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36424"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2024-46843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46843"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-36387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36387"
},
{
"name": "CVE-2025-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38709"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4408"
},
{
"name": "CVE-2025-71235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71235"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-53602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53602"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2023-53867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53867"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2025-37926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37926"
},
{
"name": "CVE-2024-46715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46715"
},
{
"name": "CVE-2025-38038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38038"
},
{
"name": "CVE-2024-46802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46802"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2023-33053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33053"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2026-24051",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24051"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2025-38261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38261"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-69644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69644"
},
{
"name": "CVE-2022-49303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49303"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2025-59465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59465"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2024-42320",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42320"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2024-53234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53234"
},
{
"name": "CVE-2025-11961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11961"
},
{
"name": "CVE-2025-39877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39877"
},
{
"name": "CVE-2022-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3114"
},
{
"name": "CVE-2023-52916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52916"
},
{
"name": "CVE-2025-38064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38064"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2022-50628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50628"
},
{
"name": "CVE-2024-56718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56718"
},
{
"name": "CVE-2024-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
},
{
"name": "CVE-2025-39886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39886"
},
{
"name": "CVE-2022-50350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50350"
},
{
"name": "CVE-2025-21831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21831"
},
{
"name": "CVE-2022-50721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50721"
},
{
"name": "CVE-2022-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50095"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2024-26662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
},
{
"name": "CVE-2026-3196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3196"
},
{
"name": "CVE-2025-61662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61662"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2024-50217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50217"
},
{
"name": "CVE-2021-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0168"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2022-50479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50479"
},
{
"name": "CVE-2022-50583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50583"
},
{
"name": "CVE-2025-37806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37806"
},
{
"name": "CVE-2024-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38554"
},
{
"name": "CVE-2025-68822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68822"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2023-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0030"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-39838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39838"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2024-53179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53179"
},
{
"name": "CVE-2024-57945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57945"
},
{
"name": "CVE-2023-54233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54233"
},
{
"name": "CVE-2024-43899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43899"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2019-15213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15213"
},
{
"name": "CVE-2025-38234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38234"
},
{
"name": "CVE-2022-49935",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49935"
},
{
"name": "CVE-2021-44532",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44532"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2022-49534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49534"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-50012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50012"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2023-53010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53010"
},
{
"name": "CVE-2024-35956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35956"
},
{
"name": "CVE-2024-57888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57888"
},
{
"name": "CVE-2025-65637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65637"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2023-54237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54237"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2023-53424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53424"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2022-49134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49134"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2022-49333",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49333"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2025-27111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27111"
},
{
"name": "CVE-2024-49994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2019-19814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19814"
},
{
"name": "CVE-2022-49136",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49136"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2024-36898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36898"
},
{
"name": "CVE-2024-44962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44962"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2024-35931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35931"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2026-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23138"
},
{
"name": "CVE-2025-39927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39927"
},
{
"name": "CVE-2026-1703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1703"
},
{
"name": "CVE-2023-26551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26551"
},
{
"name": "CVE-2024-46857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46857"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2024-53210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53210"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2022-49342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49342"
},
{
"name": "CVE-2015-8553",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8553"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2024-36966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36966"
},
{
"name": "CVE-2023-53332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53332"
},
{
"name": "CVE-2024-35924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35924"
},
{
"name": "CVE-2024-58095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2022-49471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49471"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2025-21751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21751"
},
{
"name": "CVE-2023-53753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53753"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2026-23234",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23234"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2024-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50106"
},
{
"name": "CVE-2025-23162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23162"
},
{
"name": "CVE-2026-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23133"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2025-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46727"
},
{
"name": "CVE-2017-13694",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13694"
},
{
"name": "CVE-2025-71102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71102"
},
{
"name": "CVE-2026-23212",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23212"
},
{
"name": "CVE-2013-7445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7445"
},
{
"name": "CVE-2026-23170",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23170"
},
{
"name": "CVE-2023-52701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52701"
},
{
"name": "CVE-2024-49906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49906"
},
{
"name": "CVE-2024-26647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26647"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2024-47809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47809"
},
{
"name": "CVE-2026-23204",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23204"
},
{
"name": "CVE-2022-49317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49317"
},
{
"name": "CVE-2026-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23019"
},
{
"name": "CVE-2018-12928",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12928"
},
{
"name": "CVE-2025-71188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71188"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-56607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56607"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2026-27142",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27142"
},
{
"name": "CVE-2024-49904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49904"
},
{
"name": "CVE-2023-53671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53671"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2024-26938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26938"
},
{
"name": "CVE-2026-28417",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28417"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2024-35999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35999"
},
{
"name": "CVE-2023-29942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29942"
},
{
"name": "CVE-2026-23125",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23125"
},
{
"name": "CVE-2026-0966",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0966"
},
{
"name": "CVE-2022-48633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48633"
},
{
"name": "CVE-2022-3238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3238"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2026-22185",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22185"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2023-53584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53584"
},
{
"name": "CVE-2024-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57809"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2024-56719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56719"
},
{
"name": "CVE-2022-50418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50418"
},
{
"name": "CVE-2023-53438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53438"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2023-53460",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53460"
},
{
"name": "CVE-2026-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23214"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2024-56671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56671"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2025-62626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62626"
},
{
"name": "CVE-2025-39940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39940"
},
{
"name": "CVE-2023-52751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52751"
},
{
"name": "CVE-2022-49562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49562"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2023-53483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53483"
},
{
"name": "CVE-2023-53673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53673"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-37746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37746"
},
{
"name": "CVE-2022-38076",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38076"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2026-23178",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23178"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2024-56368",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2022-49172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49172"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2024-40979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40979"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2026-23240",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23240"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2026-23228",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23228"
},
{
"name": "CVE-2024-49945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49945"
},
{
"name": "CVE-2022-44033",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44033"
},
{
"name": "CVE-2024-56757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56757"
},
{
"name": "CVE-2023-53662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53662"
},
{
"name": "CVE-2025-38069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38069"
},
{
"name": "CVE-2022-49750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49750"
},
{
"name": "CVE-2023-53707",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53707"
},
{
"name": "CVE-2023-53115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53115"
},
{
"name": "CVE-2025-71196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71196"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2023-54107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54107"
},
{
"name": "CVE-2022-48646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48646"
},
{
"name": "CVE-2024-43912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43912"
},
{
"name": "CVE-2024-35808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35808"
},
{
"name": "CVE-2024-58012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58012"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-61663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61663"
},
{
"name": "CVE-2025-68772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68772"
},
{
"name": "CVE-2024-49891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49891"
},
{
"name": "CVE-2024-36948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36948"
},
{
"name": "CVE-2022-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48887"
},
{
"name": "CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"name": "CVE-2024-26948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26948"
},
{
"name": "CVE-2023-53370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53370"
},
{
"name": "CVE-2024-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53187"
},
{
"name": "CVE-2023-45929",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45929"
},
{
"name": "CVE-2025-68343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68343"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2024-57795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57795"
},
{
"name": "CVE-2025-37855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37855"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2021-33115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33115"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2020-26559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26559"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2024-39508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39508"
},
{
"name": "CVE-2026-23191",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23191"
},
{
"name": "CVE-2026-32249",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32249"
},
{
"name": "CVE-2025-37899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37899"
},
{
"name": "CVE-2026-23078",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23078"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2024-43831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43831"
},
{
"name": "CVE-2023-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30630"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2026-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23169"
},
{
"name": "CVE-2025-38330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38330"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2017-13693",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13693"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2024-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50284"
},
{
"name": "CVE-2022-49306",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49306"
},
{
"name": "CVE-2024-49898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49898"
},
{
"name": "CVE-2025-36423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36423"
},
{
"name": "CVE-2022-49622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49622"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2024-50211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50211"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2022-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50284"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2023-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22028"
},
{
"name": "CVE-2024-41008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41008"
},
{
"name": "CVE-2024-27035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27035"
},
{
"name": "CVE-2023-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53218"
},
{
"name": "CVE-2022-25836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25836"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-29934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29934"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2022-49133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49133"
},
{
"name": "CVE-2024-36951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36951"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2025-38438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38438"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2023-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26555"
},
{
"name": "CVE-2023-1193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1193"
},
{
"name": "CVE-2025-71220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71220"
},
{
"name": "CVE-2024-46806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46806"
},
{
"name": "CVE-2022-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50073"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2026-23103",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23103"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-68786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68786"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2022-50393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50393"
},
{
"name": "CVE-2025-68779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68779"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-21819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21819"
},
{
"name": "CVE-2025-48514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48514"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2025-71199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71199"
},
{
"name": "CVE-2024-47664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47664"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2026-25749",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25749"
},
{
"name": "CVE-2024-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49504"
},
{
"name": "CVE-2025-38118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53367"
},
{
"name": "CVE-2022-50500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50500"
},
{
"name": "CVE-2019-14899",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14899"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2024-53098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53098"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2026-23180",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23180"
},
{
"name": "CVE-2021-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0164"
},
{
"name": "CVE-2026-26958",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26958"
},
{
"name": "CVE-2024-46870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46870"
},
{
"name": "CVE-2022-49178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49178"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2024-49929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49929"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2023-53748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53748"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2022-49173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49173"
},
{
"name": "CVE-2024-45781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45781"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2024-53056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53056"
},
{
"name": "CVE-2022-50551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50551"
},
{
"name": "CVE-2026-26269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26269"
},
{
"name": "CVE-2024-43872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43872"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2025-71069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71069"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2023-52939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52939"
},
{
"name": "CVE-2024-14027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-14027"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-69649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69649"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2024-49859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49859"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-71195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71195"
},
{
"name": "CVE-2022-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49766"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-22043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22043"
},
{
"name": "CVE-2024-49569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49569"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2023-52569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52569"
},
{
"name": "CVE-2024-56609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56609"
},
{
"name": "CVE-2022-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49940"
},
{
"name": "CVE-2026-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23083"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2024-56611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56611"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2026-23088",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23088"
},
{
"name": "CVE-2020-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25743"
},
{
"name": "CVE-2022-50167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50167"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2026-27704",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27704"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2023-45896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45896"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2024-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49940"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2021-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3735"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2024-46861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46861"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2022-50634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50634"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-54514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54514"
},
{
"name": "CVE-2025-71202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71202"
},
{
"name": "CVE-2015-7837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7837"
},
{
"name": "CVE-2025-0677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0677"
},
{
"name": "CVE-2024-45780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45780"
},
{
"name": "CVE-2024-46749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46749"
},
{
"name": "CVE-2022-50492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50492"
},
{
"name": "CVE-2024-49888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49888"
},
{
"name": "CVE-2022-50406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50406"
},
{
"name": "CVE-2023-26552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26552"
},
{
"name": "CVE-2024-49921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49921"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2026-23108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23108"
},
{
"name": "CVE-2025-71180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71180"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-59691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59691"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2023-52481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52481"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2025-22057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22057"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2023-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
},
{
"name": "CVE-2024-50056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
},
{
"name": "CVE-2025-71194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71194"
},
{
"name": "CVE-2026-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1788"
},
{
"name": "CVE-2023-53721",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53721"
},
{
"name": "CVE-2025-22113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2022-50256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50256"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2025-37907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37907"
},
{
"name": "CVE-2024-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38625"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2023-4010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4010"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2024-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46727"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2023-54105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54105"
},
{
"name": "CVE-2018-17977",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17977"
},
{
"name": "CVE-2019-1010204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010204"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2026-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26960"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2022-50354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50354"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2026-23068",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23068"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2024-43823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43823"
},
{
"name": "CVE-2023-52589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52589"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2026-23216",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23216"
},
{
"name": "CVE-2023-53434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53434"
},
{
"name": "CVE-2023-29935",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29935"
},
{
"name": "CVE-2023-35061",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35061"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2025-71225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71225"
},
{
"name": "CVE-2026-21636",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21636"
},
{
"name": "CVE-2026-23239",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23239"
},
{
"name": "CVE-2021-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0172"
},
{
"name": "CVE-2024-47662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47662"
},
{
"name": "CVE-2018-12930",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12930"
},
{
"name": "CVE-2026-23071",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23071"
},
{
"name": "CVE-2024-49970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49970"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26844"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2026-23056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23056"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2023-32644",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32644"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2024-46681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46681"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-40012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40012"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2026-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0964"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2024-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47141"
},
{
"name": "CVE-2024-8354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8354"
},
{
"name": "CVE-2023-54323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54323"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2025-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0689"
},
{
"name": "CVE-2022-50316",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50316"
},
{
"name": "CVE-2023-31347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31347"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-22111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
},
{
"name": "CVE-2023-53657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53657"
},
{
"name": "CVE-2024-49915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49915"
},
{
"name": "CVE-2026-23063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23063"
},
{
"name": "CVE-2025-55132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55132"
},
{
"name": "CVE-2023-52732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52732"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2026-23073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23073"
},
{
"name": "CVE-2022-49167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49167"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2026-27903",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27903"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2024-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2025-0690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0690"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2023-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53052"
},
{
"name": "CVE-2026-23058",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23058"
},
{
"name": "CVE-2022-49234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49234"
},
{
"name": "CVE-2022-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50163"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2025-71067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71067"
},
{
"name": "CVE-2024-49919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49919"
},
{
"name": "CVE-2026-23238",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23238"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2020-26556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26556"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23038"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2021-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
},
{
"name": "CVE-2024-26699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26699"
},
{
"name": "CVE-2024-57876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57876"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2022-50390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50390"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-71186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71186"
},
{
"name": "CVE-2024-53220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53220"
},
{
"name": "CVE-2026-23176",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23176"
},
{
"name": "CVE-2023-53539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53539"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-68821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68821"
},
{
"name": "CVE-2025-31648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31648"
},
{
"name": "CVE-2025-0678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0678"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2026-23026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23026"
},
{
"name": "CVE-2024-56674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56674"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2024-31884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31884"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2019-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1563"
},
{
"name": "CVE-2026-1002",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1002"
},
{
"name": "CVE-2026-23128",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23128"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2023-53574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53574"
},
{
"name": "CVE-2022-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50166"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-71190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71190"
},
{
"name": "CVE-2024-56738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56738"
},
{
"name": "CVE-2022-50778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50778"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2022-49971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49971"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2025-21693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21693"
},
{
"name": "CVE-2025-71203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71203"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2025-39789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39789"
},
{
"name": "CVE-2022-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49124"
},
{
"name": "CVE-2024-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49901"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2024-56583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56583"
},
{
"name": "CVE-2022-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50195"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2024-40998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
},
{
"name": "CVE-2024-56712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56712"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-52634",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52634"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2025-62526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62526"
},
{
"name": "CVE-2024-49918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49918"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2024-45776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45776"
},
{
"name": "CVE-2022-50090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50090"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2020-14356",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14356"
},
{
"name": "CVE-2025-68745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68745"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2023-53764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53764"
},
{
"name": "CVE-2024-53687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53687"
},
{
"name": "CVE-2025-39901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39901"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2024-38628",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38628"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-38672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38672"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2025-0684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0684"
},
{
"name": "CVE-2025-10158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10158"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2024-47794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47794"
},
{
"name": "CVE-2026-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23146"
},
{
"name": "CVE-2025-38272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38272"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2019-20794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20794"
},
{
"name": "CVE-2023-53849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53849"
},
{
"name": "CVE-2022-4543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4543"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2026-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23037"
},
{
"name": "CVE-2023-53627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53627"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-38091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38091"
},
{
"name": "CVE-2023-53510",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53510"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2023-53575",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53575"
},
{
"name": "CVE-2022-49516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49516"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2022-3523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3523"
},
{
"name": "CVE-2026-26157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26157"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2023-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38417"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-71224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71224"
},
{
"name": "CVE-2025-22072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22072"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2021-45261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45261"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2026-23193",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23193"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2024-47736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47736"
},
{
"name": "CVE-2023-53037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53037"
},
{
"name": "CVE-2024-46842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46842"
},
{
"name": "CVE-2025-71237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71237"
},
{
"name": "CVE-2025-13462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13462"
},
{
"name": "CVE-2024-50112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50112"
},
{
"name": "CVE-2025-69646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69646"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2026-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23215"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2020-26142",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26142"
},
{
"name": "CVE-2022-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49955"
},
{
"name": "CVE-2023-53628",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53628"
},
{
"name": "CVE-2025-29943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29943"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2023-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31346"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-38140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38140"
},
{
"name": "CVE-2022-50002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50002"
},
{
"name": "CVE-2025-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38621"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39908"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2024-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49920"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2026-23118",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23118"
},
{
"name": "CVE-2025-34034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-34034"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-59692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59692"
},
{
"name": "CVE-2022-50116",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50116"
},
{
"name": "CVE-2018-12931",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12931"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2022-50224",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50224"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2020-13791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13791"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2024-49990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49990"
},
{
"name": "CVE-2020-15802",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15802"
},
{
"name": "CVE-2020-24240",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24240"
},
{
"name": "CVE-2024-46718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46718"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2023-53545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53545"
},
{
"name": "CVE-2022-50552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50552"
},
{
"name": "CVE-2021-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0066"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2023-53376",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53376"
},
{
"name": "CVE-2023-53538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53538"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2022-50357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50357"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2023-52671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52671"
},
{
"name": "CVE-2022-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50303"
},
{
"name": "CVE-2024-35870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35870"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2026-23221",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23221"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-36013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36013"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2023-52676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52676"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2017-13165",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13165"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39932"
},
{
"name": "CVE-2024-47683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47683"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-46811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46811"
},
{
"name": "CVE-2025-21985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
},
{
"name": "CVE-2025-22109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2023-53635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53635"
},
{
"name": "CVE-2025-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39810"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-23132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23132"
},
{
"name": "CVE-2024-47678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47678"
},
{
"name": "CVE-2022-49531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49531"
},
{
"name": "CVE-2022-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49504"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2022-49810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49810"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-71109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71109"
},
{
"name": "CVE-2023-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26586"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-44950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44950"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2022-50332",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50332"
},
{
"name": "CVE-2023-53822",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53822"
},
{
"name": "CVE-2024-27408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27408"
},
{
"name": "CVE-2025-71222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71222"
},
{
"name": "CVE-2022-50461",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50461"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2023-26554",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26554"
},
{
"name": "CVE-2025-38486",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38486"
},
{
"name": "CVE-2021-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26934"
},
{
"name": "CVE-2023-53466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53466"
},
{
"name": "CVE-2025-21629",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21629"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-53168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53168"
},
{
"name": "CVE-2022-49528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49528"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2022-49218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49218"
},
{
"name": "CVE-2023-52749",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52749"
},
{
"name": "CVE-2025-39754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39754"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2022-49967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49967"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2022-49245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49245"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2023-52682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52682"
},
{
"name": "CVE-2022-50871",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50871"
},
{
"name": "CVE-2025-71150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71150"
},
{
"name": "CVE-2025-71229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71229"
},
{
"name": "CVE-2026-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23213"
},
{
"name": "CVE-2025-39958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39958"
},
{
"name": "CVE-2018-8956",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8956"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2026-23091",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23091"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2022-49420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49420"
},
{
"name": "CVE-2022-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40964"
},
{
"name": "CVE-2025-69873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69873"
},
{
"name": "CVE-2026-3441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3441"
},
{
"name": "CVE-2024-36244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36244"
},
{
"name": "CVE-2023-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53149"
},
{
"name": "CVE-2026-23237",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23237"
},
{
"name": "CVE-2024-49987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49987"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2022-50746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50746"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2024-50034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50034"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-71192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71192"
},
{
"name": "CVE-2023-53596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53596"
},
{
"name": "CVE-2022-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49943"
},
{
"name": "CVE-2022-50260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50260"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2026-23121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23121"
},
{
"name": "CVE-2020-12319",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12319"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-49568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49568"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2024-36924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36924"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2023-3397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3397"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2024-26672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26672"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2026-0965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0965"
},
{
"name": "CVE-2023-53806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53806"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2021-33139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33139"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-71236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71236"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2024-50057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50057"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2024-46808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46808"
},
{
"name": "CVE-2026-26158",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26158"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-68288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68288"
},
{
"name": "CVE-2025-38168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38168"
},
{
"name": "CVE-2023-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53547"
},
{
"name": "CVE-2019-20426",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20426"
},
{
"name": "CVE-2025-71107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71107"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2026-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29786"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-56584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56584"
},
{
"name": "CVE-2026-23235",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23235"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-71152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71152"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-56692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56692"
},
{
"name": "CVE-2024-53196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53196"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2022-50212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50212"
},
{
"name": "CVE-2026-23087",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23087"
},
{
"name": "CVE-2023-54259",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54259"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2025-1369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1369"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2023-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53231"
},
{
"name": "CVE-2025-71185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71185"
},
{
"name": "CVE-2022-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2961"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-49635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49635"
},
{
"name": "CVE-2024-50017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50017"
},
{
"name": "CVE-2026-23096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23096"
},
{
"name": "CVE-2024-53241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53241"
},
{
"name": "CVE-2025-14180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14180"
},
{
"name": "CVE-2026-23949",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23949"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-33155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33155"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2024-57899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57899"
},
{
"name": "CVE-2024-49928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49928"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2024-50187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50187"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2025-36001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36001"
},
{
"name": "CVE-2022-50464",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50464"
},
{
"name": "CVE-2025-38674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38674"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2020-26560",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26560"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-45777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45777"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2022-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49965"
},
{
"name": "CVE-2025-54771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54771"
},
{
"name": "CVE-2024-0564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0564"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2022-49961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49961"
},
{
"name": "CVE-2025-69651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69651"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2024-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58098"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2022-28667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28667"
},
{
"name": "CVE-2023-53383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53383"
},
{
"name": "CVE-2024-46717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46717"
},
{
"name": "CVE-2024-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25743"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2026-23164",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23164"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2025-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0033"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2024-42319",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42319"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-13716",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13716"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2024-36024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36024"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2023-52879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52879"
},
{
"name": "CVE-2025-68281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68281"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2025-38440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38440"
},
{
"name": "CVE-2026-23124",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23124"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2024-53224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53224"
},
{
"name": "CVE-2024-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49910"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2023-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53105"
},
{
"name": "CVE-2025-68236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68236"
},
{
"name": "CVE-2024-39286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39286"
},
{
"name": "CVE-2025-25184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25184"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-68333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68333"
},
{
"name": "CVE-2024-47689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47689"
},
{
"name": "CVE-2025-71160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71160"
},
{
"name": "CVE-2025-71232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71232"
},
{
"name": "CVE-2023-52625",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52625"
},
{
"name": "CVE-2023-53353",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53353"
},
{
"name": "CVE-2024-58096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2023-53401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53401"
},
{
"name": "CVE-2025-22037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22037"
},
{
"name": "CVE-2023-53702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53702"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2023-54059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54059"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2021-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0170"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2024-53133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53133"
},
{
"name": "CVE-2026-23075",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23075"
},
{
"name": "CVE-2022-50571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50571"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2026-23120",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23120"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2022-49393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49393"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2025-39851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39851"
},
{
"name": "CVE-2025-71204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71204"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-26758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26758"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2023-32651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32651"
},
{
"name": "CVE-2025-37747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37747"
},
{
"name": "CVE-2026-2297",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2297"
},
{
"name": "CVE-2026-23105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23105"
},
{
"name": "CVE-2023-53036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53036"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-71115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71115"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2022-50862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50862"
},
{
"name": "CVE-2025-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1118"
},
{
"name": "CVE-2024-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50166"
},
{
"name": "CVE-2024-35862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35862"
},
{
"name": "CVE-2023-53355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53355"
},
{
"name": "CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"name": "CVE-2026-0967",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0967"
},
{
"name": "CVE-2026-23181",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23181"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2023-53558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53558"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-68214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68214"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2026-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23141"
},
{
"name": "CVE-2026-22860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22860"
},
{
"name": "CVE-2025-36365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36365"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2025-40247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40247"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-56641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2025-0686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0686"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2024-49992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49992"
},
{
"name": "CVE-2025-68781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68781"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2026-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23182"
},
{
"name": "CVE-2021-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0173"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2024-45778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45778"
},
{
"name": "CVE-2026-23086",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23086"
},
{
"name": "CVE-2024-47661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47661"
},
{
"name": "CVE-2026-28418",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28418"
},
{
"name": "CVE-2023-54151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54151"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2024-46803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46803"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-59466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59466"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2022-36351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36351"
},
{
"name": "CVE-2023-52921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52921"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2024-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36478"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2026-25639",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25639"
},
{
"name": "CVE-2026-1299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1299"
},
{
"name": "CVE-2024-54683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54683"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2024-46720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46720"
},
{
"name": "CVE-2024-26658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26658"
},
{
"name": "CVE-2026-2243",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2243"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2021-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0174"
},
{
"name": "CVE-2025-8746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8746"
},
{
"name": "CVE-2025-36442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36442"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2026-0968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0968"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-45779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45779"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2024-57857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57857"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-50213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50213"
},
{
"name": "CVE-2024-46823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46823"
},
{
"name": "CVE-2023-32642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32642"
},
{
"name": "CVE-2025-71227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71227"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2024-46733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46733"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2022-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50015"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2024-7883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7883"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2022-50772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50772"
},
{
"name": "CVE-2024-56717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56717"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2023-54234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54234"
},
{
"name": "CVE-2022-45885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45885"
},
{
"name": "CVE-2022-49783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49783"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2025-47153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47153"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2024-53216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53216"
},
{
"name": "CVE-2022-49539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49539"
},
{
"name": "CVE-2024-36347",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36347"
},
{
"name": "CVE-2024-26869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26869"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2021-20255",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20255"
},
{
"name": "CVE-2022-48979",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48979"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-71193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71193"
},
{
"name": "CVE-2023-54180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54180"
},
{
"name": "CVE-2026-23095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23095"
},
{
"name": "CVE-2024-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46848"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2024-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36009"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2023-25951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25951"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2023-53152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53152"
},
{
"name": "CVE-2021-0308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0308"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2024-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50009"
},
{
"name": "CVE-2025-39850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39850"
},
{
"name": "CVE-2022-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1205"
},
{
"name": "CVE-2023-45927",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45927"
},
{
"name": "CVE-2020-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25742"
},
{
"name": "CVE-2022-0987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0987"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-38199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38199"
},
{
"name": "CVE-2025-39905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39905"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2022-50720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50720"
},
{
"name": "CVE-2025-71105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71105"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2022-49529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49529"
},
{
"name": "CVE-2025-68266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68266"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2024-26876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26876"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2023-52657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52657"
},
{
"name": "CVE-2025-37876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37876"
},
{
"name": "CVE-2024-58089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58089"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2026-27571",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27571"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2026-27139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27139"
},
{
"name": "CVE-2022-49127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49127"
},
{
"name": "CVE-2026-24733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24733"
},
{
"name": "CVE-2020-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25741"
},
{
"name": "CVE-2022-50748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50748"
},
{
"name": "CVE-2023-53767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53767"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-39863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39863"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2023-53180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53180"
},
{
"name": "CVE-2026-28419",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28419"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2023-53385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53385"
},
{
"name": "CVE-2026-23206",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23206"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2024-46678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46678"
},
{
"name": "CVE-2024-58097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
},
{
"name": "CVE-2023-53620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53620"
},
{
"name": "CVE-2022-50539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50539"
},
{
"name": "CVE-2025-71068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71068"
},
{
"name": "CVE-2025-23130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23130"
},
{
"name": "CVE-2022-49496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49496"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2024-56782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56782"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2023-53540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53540"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-53261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53261"
},
{
"name": "CVE-2026-24049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24049"
},
{
"name": "CVE-2026-23033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23033"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2023-54187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54187"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2026-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23145"
},
{
"name": "CVE-2022-44032",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44032"
},
{
"name": "CVE-2024-57895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57895"
},
{
"name": "CVE-2023-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53240"
},
{
"name": "CVE-2025-13735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13735"
},
{
"name": "CVE-2023-53694",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53694"
},
{
"name": "CVE-2024-53195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53195"
},
{
"name": "CVE-2024-35794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35794"
},
{
"name": "CVE-2023-52829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52829"
},
{
"name": "CVE-2026-23003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23003"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-56660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56660"
},
{
"name": "CVE-2026-23076",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23076"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2025-38033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38033"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-47704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47704"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-49978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49978"
},
{
"name": "CVE-2024-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36910"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2025-36366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36366"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2025-36123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36123"
},
{
"name": "CVE-2024-56737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56737"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2020-11935",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11935"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-22042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22042"
},
{
"name": "CVE-2025-71158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71158"
},
{
"name": "CVE-2022-49803",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49803"
},
{
"name": "CVE-2024-57898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57898"
},
{
"name": "CVE-2020-35503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35503"
},
{
"name": "CVE-2024-49923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49923"
},
{
"name": "CVE-2024-56639",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56639"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23171"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-53002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53002"
},
{
"name": "CVE-2021-0183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0183"
},
{
"name": "CVE-2025-39884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39884"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"name": "CVE-2024-35826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35826"
},
{
"name": "CVE-2026-23112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23112"
},
{
"name": "CVE-2022-49764",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49764"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-21651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21651"
},
{
"name": "CVE-2025-38092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38092"
},
{
"name": "CVE-2025-22124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2023-26553",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26553"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-37776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37776"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2024-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6519"
},
{
"name": "CVE-2024-46729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46729"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-50266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50266"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2026-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23084"
},
{
"name": "CVE-2023-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53093"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2026-23190",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23190"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2026-22979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22979"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2024-49991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49991"
},
{
"name": "CVE-2022-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50009"
},
{
"name": "CVE-2022-26047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26047"
},
{
"name": "CVE-2024-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53240"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-37877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37877"
},
{
"name": "CVE-2024-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2193"
},
{
"name": "CVE-2025-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4382"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2025-71161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71161"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-22038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22038"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2022-48816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48816"
},
{
"name": "CVE-2026-27141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27141"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-50518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50518"
},
{
"name": "CVE-2022-49829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49829"
},
{
"name": "CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2016-2568",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2568"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2018-12929",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12929"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2024-53147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53147"
},
{
"name": "CVE-2025-39952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39952"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2024-45783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45783"
},
{
"name": "CVE-2026-23110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23110"
},
{
"name": "CVE-2023-53410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53410"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2023-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47210"
},
{
"name": "CVE-2025-68809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68809"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2021-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0165"
},
{
"name": "CVE-2025-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
},
{
"name": "CVE-2022-49177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49177"
},
{
"name": "CVE-2025-38205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38205"
},
{
"name": "CVE-2026-23100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23100"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2024-58241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58241"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2022-49833",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49833"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-68282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68282"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-68817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68817"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2024-46726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46726"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2024-53079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53079"
},
{
"name": "CVE-2025-68787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68787"
},
{
"name": "CVE-2025-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1125"
},
{
"name": "CVE-2023-53647",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53647"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
},
{
"name": "CVE-2025-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0012"
},
{
"name": "CVE-2020-12313",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12313"
},
{
"name": "CVE-2025-71233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71233"
},
{
"name": "CVE-2025-68782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68782"
},
{
"name": "CVE-2021-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0166"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2022-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3872"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-71197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71197"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2024-49931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49931"
},
{
"name": "CVE-2024-43866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43866"
},
{
"name": "CVE-2024-37021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37021"
},
{
"name": "CVE-2024-47728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47728"
},
{
"name": "CVE-2025-27610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27610"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2026-23031",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23031"
},
{
"name": "CVE-2024-46730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46730"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2025-71127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71127"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2024-46728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46728"
},
{
"name": "CVE-2023-53561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53561"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2026-23050",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23050"
},
{
"name": "CVE-2024-58100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58100"
},
{
"name": "CVE-2020-0256",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0256"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-26954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26954"
},
{
"name": "CVE-2025-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21634"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2025-38047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38047"
},
{
"name": "CVE-2024-47738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47738"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2024-41013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41013"
},
{
"name": "CVE-2023-54320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54320"
},
{
"name": "CVE-2024-43911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43911"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2017-0537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0537"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2025-68219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68219"
},
{
"name": "CVE-2022-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50232"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2023-26112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26112"
},
{
"name": "CVE-2018-6952",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6952"
},
{
"name": "CVE-2020-14304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14304"
},
{
"name": "CVE-2024-46834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46834"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2026-24001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24001"
},
{
"name": "CVE-2025-37807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37807"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2022-50016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50016"
},
{
"name": "CVE-2025-29481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29481"
},
{
"name": "CVE-2024-53219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53219"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-61661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61661"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2024-25740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25740"
},
{
"name": "CVE-2024-50246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50246"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-14178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14178"
},
{
"name": "CVE-2024-57950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57950"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2025-40325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2026-23113",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23113"
},
{
"name": "CVE-2021-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0176"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2022-48998",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48998"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2024-42273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42273"
},
{
"name": "CVE-2025-68336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68336"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2026-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23157"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2022-49974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49974"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2019-20633",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20633"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2021-3714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3714"
},
{
"name": "CVE-2023-54071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54071"
},
{
"name": "CVE-2024-56566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56566"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-47745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47745"
},
{
"name": "CVE-2025-39833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39833"
},
{
"name": "CVE-2026-23097",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23097"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2024-53190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53190"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2024-35784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35784"
},
{
"name": "CVE-2024-56591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56591"
},
{
"name": "CVE-2024-56544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56544"
},
{
"name": "CVE-2024-56647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56647"
},
{
"name": "CVE-2025-71198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71198"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2024-57976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57976"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2025-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0685"
},
{
"name": "CVE-2024-57893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57893"
},
{
"name": "CVE-2026-23231",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23231"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2022-50071",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50071"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2024-56180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56180"
},
{
"name": "CVE-2023-39333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39333"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2021-3864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3864"
},
{
"name": "CVE-2025-39771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39771"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2024-26648",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26648"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2020-24352",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24352"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2022-49296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49296"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2024-49914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49914"
},
{
"name": "CVE-2025-38360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38360"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-36407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36407"
},
{
"name": "CVE-2024-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0217"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2021-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47658"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2025-4575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4575"
},
{
"name": "CVE-2019-12067",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12067"
},
{
"name": "CVE-2024-57843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57843"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2024-50135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50135"
},
{
"name": "CVE-2024-49916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49916"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2024-49988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49988"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2024-49861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49861"
},
{
"name": "CVE-2026-23093",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23093"
},
{
"name": "CVE-2024-49893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49893"
},
{
"name": "CVE-2024-44963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44963"
},
{
"name": "CVE-2023-53348",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53348"
},
{
"name": "CVE-2022-48766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48766"
},
{
"name": "CVE-2019-15794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15794"
},
{
"name": "CVE-2024-49917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49917"
},
{
"name": "CVE-2022-50467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50467"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-32441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32441"
},
{
"name": "CVE-2024-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48875"
},
{
"name": "CVE-2024-41935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41935"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2025-71183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71183"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2023-53382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53382"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2025-39677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39677"
},
{
"name": "CVE-2023-53651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53651"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2025-68371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68371"
},
{
"name": "CVE-2022-50383",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50383"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-53387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53387"
},
{
"name": "CVE-2026-31802",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31802"
},
{
"name": "CVE-2024-45774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45774"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2025-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
},
{
"name": "CVE-2025-13465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13465"
},
{
"name": "CVE-2025-61664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61664"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2026-25702",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25702"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2022-50863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50863"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2024-35843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35843"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-39762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39762"
},
{
"name": "CVE-2024-40999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40999"
},
{
"name": "CVE-2023-53292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53292"
},
{
"name": "CVE-2023-52576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52576"
},
{
"name": "CVE-2024-27002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27002"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-57887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57887"
},
{
"name": "CVE-2025-21730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21730"
},
{
"name": "CVE-2024-35865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35865"
},
{
"name": "CVE-2025-71184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71184"
},
{
"name": "CVE-2023-52660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52660"
},
{
"name": "CVE-2024-35995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35995"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2023-53371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53371"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22041"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-22127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22127"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2024-27011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27011"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"name": "CVE-2024-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38543"
},
{
"name": "CVE-2025-68263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68263"
},
{
"name": "CVE-2023-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53187"
},
{
"name": "CVE-2025-38689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38689"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2022-48744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48744"
},
{
"name": "CVE-2025-38070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38070"
},
{
"name": "CVE-2025-68755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68755"
},
{
"name": "CVE-2025-62525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62525"
},
{
"name": "CVE-2025-71238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71238"
},
{
"name": "CVE-2021-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0175"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2022-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48706"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2024-46716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46716"
},
{
"name": "CVE-2012-4542",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4542"
},
{
"name": "CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2022-49267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49267"
},
{
"name": "CVE-2024-56592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56592"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-38189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38189"
},
{
"name": "CVE-2022-48628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48628"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-50138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50138"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2021-44534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44534"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"name": "CVE-2024-56565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56565"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2024-57872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57872"
},
{
"name": "CVE-2023-28720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28720"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2026-23080",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23080"
},
{
"name": "CVE-2024-46833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46833"
},
{
"name": "CVE-2024-47703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47703"
},
{
"name": "CVE-2023-53742",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53742"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38041"
},
{
"name": "CVE-2024-53177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53177"
},
{
"name": "CVE-2024-56588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56588"
},
{
"name": "CVE-2023-53452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53452"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2022-50616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50616"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2023-53544",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53544"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2024-49911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49911"
},
{
"name": "CVE-2026-23154",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23154"
},
{
"name": "CVE-2022-50708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50708"
},
{
"name": "CVE-2026-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3784"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
},
{
"name": "CVE-2025-9301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9301"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2026-03-20T00:00:00",
"last_revision_date": "2026-03-20T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0326",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37233",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37233"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37237",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37237"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37236",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37236"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37246",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37246"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37235",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37235"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37229",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37229"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37226",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37226"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37230",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37230"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37242",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37242"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37228",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37228"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37240",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37240"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37243",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37243"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37234",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37234"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37231",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37231"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37239",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37239"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37227",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37227"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37232",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37232"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37247",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37247"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37241",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37241"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37238",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37238"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37244",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37244"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37245",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37245"
}
]
}
CERTFR-2026-AVI-0316
Vulnerability from certfr_avis - Published: 2026-03-19 - Updated: 2026-03-19
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | NodeJS Buildpack versions antérieures à 1.8.82 | ||
| VMware | Tanzu Platform | Tanzu for MySQL sur Tanzu Platform versions antérieures à 10.1.1 | ||
| VMware | N/A | Java Buildpack versions antérieures à 4.90.0 | ||
| VMware | N/A | NGINX Buildpack versions antérieures à 1.2.71 | ||
| VMware | N/A | HWC Buildpack versions antérieures à 3.1.91 | ||
| VMware | Tanzu Platform | Foundation Core for VMware Tanzu Platform versions antérieures à 3.1.9 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.82",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.90.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NGINX Buildpack versions ant\u00e9rieures \u00e0 1.2.71",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "HWC Buildpack versions ant\u00e9rieures \u00e0 3.1.91",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core for VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-28422",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28422"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2024-35875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35875"
},
{
"name": "CVE-2022-50759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50759"
},
{
"name": "CVE-2026-26007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26007"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2024-49912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49912"
},
{
"name": "CVE-2024-36026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36026"
},
{
"name": "CVE-2026-23198",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23198"
},
{
"name": "CVE-2023-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3640"
},
{
"name": "CVE-2024-27435",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27435"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2024-42122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42122"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2026-28420",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28420"
},
{
"name": "CVE-2022-49069",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49069"
},
{
"name": "CVE-2024-57875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57875"
},
{
"name": "CVE-2022-27943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27943"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-54129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54129"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2025-39992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39992"
},
{
"name": "CVE-2025-69534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69534"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-49543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49543"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2023-53562",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53562"
},
{
"name": "CVE-2025-68324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68324"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2024-50063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50063"
},
{
"name": "CVE-2023-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33875"
},
{
"name": "CVE-2024-41001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41001"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2026-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23167"
},
{
"name": "CVE-2025-36353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36353"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2024-46770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46770"
},
{
"name": "CVE-2023-53247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53247"
},
{
"name": "CVE-2025-38042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38042"
},
{
"name": "CVE-2025-22083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22083"
},
{
"name": "CVE-2023-53829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53829"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2023-54002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54002"
},
{
"name": "CVE-2022-50550",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50550"
},
{
"name": "CVE-2022-0400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0400"
},
{
"name": "CVE-2022-49138",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49138"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2022-49359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49359"
},
{
"name": "CVE-2025-68342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68342"
},
{
"name": "CVE-2022-48673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48673"
},
{
"name": "CVE-2022-50425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50425"
},
{
"name": "CVE-2025-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38201"
},
{
"name": "CVE-2024-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39293"
},
{
"name": "CVE-2023-53008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53008"
},
{
"name": "CVE-2025-38669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38669"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2025-22107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
},
{
"name": "CVE-2024-38306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38306"
},
{
"name": "CVE-2023-53733",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53733"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2023-1386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1386"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-56703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
},
{
"name": "CVE-2026-23098",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23098"
},
{
"name": "CVE-2023-53347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53347"
},
{
"name": "CVE-2023-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28374"
},
{
"name": "CVE-2023-52926",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52926"
},
{
"name": "CVE-2026-32597",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32597"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2026-25500",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25500"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27558"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2021-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0076"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2024-58237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58237"
},
{
"name": "CVE-2024-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36909"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2023-53529",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53529"
},
{
"name": "CVE-2024-50028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50028"
},
{
"name": "CVE-2023-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53042"
},
{
"name": "CVE-2022-50527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50527"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-58094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2025-52534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52534"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2024-46705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46705"
},
{
"name": "CVE-2022-50407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50407"
},
{
"name": "CVE-2026-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23196"
},
{
"name": "CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"name": "CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"name": "CVE-2024-45775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45775"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2022-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49901"
},
{
"name": "CVE-2026-23126",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23126"
},
{
"name": "CVE-2025-38329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38329"
},
{
"name": "CVE-2021-33096",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33096"
},
{
"name": "CVE-2022-50230",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50230"
},
{
"name": "CVE-2024-35949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
},
{
"name": "CVE-2025-39947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39947"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2023-53588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53588"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2023-53685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53685"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2026-23054",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23054"
},
{
"name": "CVE-2025-37870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37870"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2022-49533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49533"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2020-26557",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26557"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2021-33114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33114"
},
{
"name": "CVE-2025-69645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69645"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2022-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49125"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2024-26866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26866"
},
{
"name": "CVE-2024-27010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2023-52561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52561"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2024-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53221"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2024-35878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35878"
},
{
"name": "CVE-2023-53362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53362"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2024-26756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26756"
},
{
"name": "CVE-2022-50815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50815"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-39826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39826"
},
{
"name": "CVE-2025-38036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38036"
},
{
"name": "CVE-2025-2668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2668"
},
{
"name": "CVE-2025-71221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71221"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2024-46860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46860"
},
{
"name": "CVE-2025-22040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22040"
},
{
"name": "CVE-2024-53095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53095"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2024-56665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56665"
},
{
"name": "CVE-2025-38340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38340"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-53629",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53629"
},
{
"name": "CVE-2022-50178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50178"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2023-7216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7216"
},
{
"name": "CVE-2025-37880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37880"
},
{
"name": "CVE-2025-36427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36427"
},
{
"name": "CVE-2026-23217",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23217"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-37833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37833"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53320"
},
{
"name": "CVE-2024-44961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44961"
},
{
"name": "CVE-2026-23069",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23069"
},
{
"name": "CVE-2025-21656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21656"
},
{
"name": "CVE-2024-46835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46835"
},
{
"name": "CVE-2025-69650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69650"
},
{
"name": "CVE-2022-50554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50554"
},
{
"name": "CVE-2023-53509",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53509"
},
{
"name": "CVE-2023-53421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53421"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2024-52005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52005"
},
{
"name": "CVE-2024-46775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46775"
},
{
"name": "CVE-2025-39764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39764"
},
{
"name": "CVE-2025-38207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38207"
},
{
"name": "CVE-2022-49465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49465"
},
{
"name": "CVE-2026-23004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23004"
},
{
"name": "CVE-2024-26807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26807"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-49742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49742"
},
{
"name": "CVE-2025-71191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71191"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2025-68364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68364"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2026-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1965"
},
{
"name": "CVE-2024-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52560"
},
{
"name": "CVE-2024-56604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56604"
},
{
"name": "CVE-2026-23227",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23227"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-52653",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2023-52508",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52508"
},
{
"name": "CVE-2025-69647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69647"
},
{
"name": "CVE-2025-39827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39827"
},
{
"name": "CVE-2024-50014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50014"
},
{
"name": "CVE-2022-49108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49108"
},
{
"name": "CVE-2024-56677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56677"
},
{
"name": "CVE-2025-38717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38717"
},
{
"name": "CVE-2026-3497",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3497"
},
{
"name": "CVE-2025-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22019"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2024-26767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26767"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2026-2219",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2219"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2024-35926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35926"
},
{
"name": "CVE-2024-27389",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27389"
},
{
"name": "CVE-2024-26983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26983"
},
{
"name": "CVE-2022-50627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50627"
},
{
"name": "CVE-2024-50285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50285"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38029"
},
{
"name": "CVE-2022-49123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49123"
},
{
"name": "CVE-2024-50289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50289"
},
{
"name": "CVE-2023-53258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53258"
},
{
"name": "CVE-2024-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46813"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47658"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2025-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38096"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2023-53429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53429"
},
{
"name": "CVE-2024-46765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46765"
},
{
"name": "CVE-2022-50380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50380"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2022-48990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48990"
},
{
"name": "CVE-2024-24864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24864"
},
{
"name": "CVE-2024-35832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35832"
},
{
"name": "CVE-2024-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36479"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2026-23220",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23220"
},
{
"name": "CVE-2024-45782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45782"
},
{
"name": "CVE-2022-50785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50785"
},
{
"name": "CVE-2025-39745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39745"
},
{
"name": "CVE-2024-35799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35799"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2026-23020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23020"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-71223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71223"
},
{
"name": "CVE-2025-36098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36098"
},
{
"name": "CVE-2025-68796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68796"
},
{
"name": "CVE-2025-40016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40016"
},
{
"name": "CVE-2023-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53765"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2023-53325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53325"
},
{
"name": "CVE-2025-21752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21752"
},
{
"name": "CVE-2026-27138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27138"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-68220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68220"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-39282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39282"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2024-40975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40975"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2023-46316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46316"
},
{
"name": "CVE-2024-47866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47866"
},
{
"name": "CVE-2024-44970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44970"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2026-23208",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23208"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-39925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39925"
},
{
"name": "CVE-2025-68769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68769"
},
{
"name": "CVE-2024-50286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50286"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-68794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68794"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2022-48667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48667"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2024-56744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56744"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2026-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3783"
},
{
"name": "CVE-2022-49161",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49161"
},
{
"name": "CVE-2021-21240",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21240"
},
{
"name": "CVE-2022-48771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48771"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-23131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
},
{
"name": "CVE-2024-27400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27400"
},
{
"name": "CVE-2023-52485",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52485"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2022-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49997"
},
{
"name": "CVE-2022-49469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49469"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2026-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23179"
},
{
"name": "CVE-2025-68334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68334"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2022-0480",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0480"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2024-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49932"
},
{
"name": "CVE-2026-23090",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23090"
},
{
"name": "CVE-2026-23035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23035"
},
{
"name": "CVE-2023-53209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53209"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
},
{
"name": "CVE-2025-1272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1272"
},
{
"name": "CVE-2025-21658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21658"
},
{
"name": "CVE-2022-49651",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49651"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2024-26770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26770"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2024-27041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27041"
},
{
"name": "CVE-2025-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36184"
},
{
"name": "CVE-2026-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3195"
},
{
"name": "CVE-2025-37743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37743"
},
{
"name": "CVE-2025-40005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40005"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2023-26242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26242"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-52673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52673"
},
{
"name": "CVE-2024-56722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56722"
},
{
"name": "CVE-2021-33113",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33113"
},
{
"name": "CVE-2022-48668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48668"
},
{
"name": "CVE-2024-27418",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27418"
},
{
"name": "CVE-2025-68231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68231"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2026-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23064"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-68806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68806"
},
{
"name": "CVE-2022-50322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50322"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2022-27635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27635"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2024-49922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49922"
},
{
"name": "CVE-2020-12317",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12317"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2024-49909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49909"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2021-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4095"
},
{
"name": "CVE-2022-50240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50240"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2024-45015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45015"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-71074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71074"
},
{
"name": "CVE-2025-38673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38673"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-11234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11234"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2026-23061",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23061"
},
{
"name": "CVE-2023-53447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53447"
},
{
"name": "CVE-2024-46754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46754"
},
{
"name": "CVE-2021-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0161"
},
{
"name": "CVE-2018-1121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1121"
},
{
"name": "CVE-2022-49547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49547"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2025-0622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0622"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-26757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26757"
},
{
"name": "CVE-2024-49899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49899"
},
{
"name": "CVE-2022-49484",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49484"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"name": "CVE-2023-53248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53248"
},
{
"name": "CVE-2024-56788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56788"
},
{
"name": "CVE-2016-8660",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8660"
},
{
"name": "CVE-2024-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26691"
},
{
"name": "CVE-2026-23047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23047"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-7519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7519"
},
{
"name": "CVE-2023-53491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53491"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-49908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49908"
},
{
"name": "CVE-2025-68265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68265"
},
{
"name": "CVE-2024-50048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50048"
},
{
"name": "CVE-2026-28421",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28421"
},
{
"name": "CVE-2026-23119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23119"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2026-27171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27171"
},
{
"name": "CVE-2022-50811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50811"
},
{
"name": "CVE-2023-4133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4133"
},
{
"name": "CVE-2024-50183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50183"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2023-53366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53366"
},
{
"name": "CVE-2022-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49910"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2022-49203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49203"
},
{
"name": "CVE-2024-40918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40918"
},
{
"name": "CVE-2024-27032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27032"
},
{
"name": "CVE-2022-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50236"
},
{
"name": "CVE-2024-35932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35932"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2026-23137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23137"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2025-37882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37882"
},
{
"name": "CVE-2024-35971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35971"
},
{
"name": "CVE-2024-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46762"
},
{
"name": "CVE-2023-34983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34983"
},
{
"name": "CVE-2024-35868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35868"
},
{
"name": "CVE-2023-53323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53323"
},
{
"name": "CVE-2026-3731",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3731"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2026-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23222"
},
{
"name": "CVE-2025-68229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68229"
},
{
"name": "CVE-2023-52857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52857"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2022-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50304"
},
{
"name": "CVE-2026-23226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23226"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2024-43844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43844"
},
{
"name": "CVE-2023-52920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52920"
},
{
"name": "CVE-2023-52590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52590"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2026-23049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23049"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2021-0072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0072"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-69652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69652"
},
{
"name": "CVE-2025-21635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21635"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38353"
},
{
"name": "CVE-2025-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36009"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2023-52761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52761"
},
{
"name": "CVE-2022-49773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49773"
},
{
"name": "CVE-2023-53609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53609"
},
{
"name": "CVE-2023-53478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53478"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2023-53682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53682"
},
{
"name": "CVE-2026-23229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23229"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-54770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54770"
},
{
"name": "CVE-2026-3442",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3442"
},
{
"name": "CVE-2024-58238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58238"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-22039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22039"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39933"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-47908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47908"
},
{
"name": "CVE-2022-49722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49722"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2025-68780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68780"
},
{
"name": "CVE-2024-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35945"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-53780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53780"
},
{
"name": "CVE-2020-35501",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35501"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2023-52624",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52624"
},
{
"name": "CVE-2024-56557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56557"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2023-52632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52632"
},
{
"name": "CVE-2024-46836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46836"
},
{
"name": "CVE-2026-23101",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23101"
},
{
"name": "CVE-2026-23099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23099"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2025-55130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55130"
},
{
"name": "CVE-2025-36070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36070"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-38105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38105"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2023-53198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53198"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2025-71121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71121"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2022-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50234"
},
{
"name": "CVE-2025-38082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38082"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-49934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49934"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2026-23066",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23066"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2023-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4969"
},
{
"name": "CVE-2024-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50098"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-53789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53789"
},
{
"name": "CVE-2022-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49858"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-36428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36428"
},
{
"name": "CVE-2023-53520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53520"
},
{
"name": "CVE-2026-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23085"
},
{
"name": "CVE-2023-52737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52737"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2026-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23209"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2024-35803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35803"
},
{
"name": "CVE-2025-22105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
},
{
"name": "CVE-2024-8612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8612"
},
{
"name": "CVE-2023-52586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52586"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2021-33110",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33110"
},
{
"name": "CVE-2025-37834",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37834"
},
{
"name": "CVE-2025-21833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2019-19378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19378"
},
{
"name": "CVE-2026-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23150"
},
{
"name": "CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2025-71073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71073"
},
{
"name": "CVE-2025-38426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38426"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2024-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36911"
},
{
"name": "CVE-2025-55131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55131"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2026-23236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23236"
},
{
"name": "CVE-2023-53068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53068"
},
{
"name": "CVE-2025-22090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
},
{
"name": "CVE-2021-31615",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31615"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2022-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49932"
},
{
"name": "CVE-2022-25837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25837"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2024-49939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49939"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2024-49905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49905"
},
{
"name": "CVE-2023-52831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52831"
},
{
"name": "CVE-2023-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53221"
},
{
"name": "CVE-2024-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26719"
},
{
"name": "CVE-2022-44034",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44034"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53072"
},
{
"name": "CVE-2023-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2007"
},
{
"name": "CVE-2022-37341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37341"
},
{
"name": "CVE-2025-69648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69648"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2024-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50298"
},
{
"name": "CVE-2025-36424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36424"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2024-46843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46843"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-36387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36387"
},
{
"name": "CVE-2025-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38709"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4408"
},
{
"name": "CVE-2025-71235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71235"
},
{
"name": "CVE-2023-53602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53602"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2023-53867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53867"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-37926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37926"
},
{
"name": "CVE-2024-46715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46715"
},
{
"name": "CVE-2025-38038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38038"
},
{
"name": "CVE-2024-46802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46802"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2023-33053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33053"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2026-24051",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24051"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2025-38261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38261"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-69644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69644"
},
{
"name": "CVE-2022-49303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49303"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2025-59465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59465"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2024-42320",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42320"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2024-53234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53234"
},
{
"name": "CVE-2025-11961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11961"
},
{
"name": "CVE-2025-39877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39877"
},
{
"name": "CVE-2022-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3114"
},
{
"name": "CVE-2023-52916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52916"
},
{
"name": "CVE-2025-38064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38064"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2022-50628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50628"
},
{
"name": "CVE-2024-56718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56718"
},
{
"name": "CVE-2024-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
},
{
"name": "CVE-2025-39886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39886"
},
{
"name": "CVE-2022-50350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50350"
},
{
"name": "CVE-2025-21831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21831"
},
{
"name": "CVE-2022-50721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50721"
},
{
"name": "CVE-2022-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50095"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2024-26662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
},
{
"name": "CVE-2026-3196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3196"
},
{
"name": "CVE-2025-61662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61662"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2024-50217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50217"
},
{
"name": "CVE-2021-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0168"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2022-50479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50479"
},
{
"name": "CVE-2022-50583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50583"
},
{
"name": "CVE-2025-37806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37806"
},
{
"name": "CVE-2024-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38554"
},
{
"name": "CVE-2025-68822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68822"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2023-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0030"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-39838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39838"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2024-53179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53179"
},
{
"name": "CVE-2024-57945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57945"
},
{
"name": "CVE-2023-54233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54233"
},
{
"name": "CVE-2024-43899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43899"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2019-15213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15213"
},
{
"name": "CVE-2025-38234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38234"
},
{
"name": "CVE-2022-49935",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49935"
},
{
"name": "CVE-2021-44532",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44532"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2022-49534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49534"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-50012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50012"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2023-53010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53010"
},
{
"name": "CVE-2024-35956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35956"
},
{
"name": "CVE-2024-57888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57888"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2023-54237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54237"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2023-53424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53424"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2022-49134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49134"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2022-49333",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49333"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2024-49994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2019-19814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19814"
},
{
"name": "CVE-2022-49136",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49136"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2024-36898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36898"
},
{
"name": "CVE-2024-44962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44962"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2024-35931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35931"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2026-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23138"
},
{
"name": "CVE-2025-39927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39927"
},
{
"name": "CVE-2023-26551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26551"
},
{
"name": "CVE-2024-46857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46857"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2024-53210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53210"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2022-49342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49342"
},
{
"name": "CVE-2015-8553",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8553"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2024-36966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36966"
},
{
"name": "CVE-2023-53332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53332"
},
{
"name": "CVE-2024-35924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35924"
},
{
"name": "CVE-2024-58095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2022-49471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49471"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2025-21751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21751"
},
{
"name": "CVE-2023-53753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53753"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2026-23234",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23234"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2024-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50106"
},
{
"name": "CVE-2025-23162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23162"
},
{
"name": "CVE-2026-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23133"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2017-13694",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13694"
},
{
"name": "CVE-2025-71102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71102"
},
{
"name": "CVE-2026-23212",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23212"
},
{
"name": "CVE-2013-7445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7445"
},
{
"name": "CVE-2026-23170",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23170"
},
{
"name": "CVE-2023-52701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52701"
},
{
"name": "CVE-2024-49906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49906"
},
{
"name": "CVE-2024-26647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26647"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2024-47809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47809"
},
{
"name": "CVE-2026-23204",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23204"
},
{
"name": "CVE-2022-49317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49317"
},
{
"name": "CVE-2026-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23019"
},
{
"name": "CVE-2018-12928",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12928"
},
{
"name": "CVE-2025-71188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71188"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-56607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56607"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2026-27142",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27142"
},
{
"name": "CVE-2024-49904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49904"
},
{
"name": "CVE-2023-53671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53671"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2024-26938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26938"
},
{
"name": "CVE-2026-28417",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28417"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2024-35999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35999"
},
{
"name": "CVE-2023-29942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29942"
},
{
"name": "CVE-2026-23125",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23125"
},
{
"name": "CVE-2026-0966",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0966"
},
{
"name": "CVE-2022-48633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48633"
},
{
"name": "CVE-2022-3238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3238"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2026-22185",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22185"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2023-53584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53584"
},
{
"name": "CVE-2024-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57809"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2024-56719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56719"
},
{
"name": "CVE-2022-50418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50418"
},
{
"name": "CVE-2023-53438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53438"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2023-53460",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53460"
},
{
"name": "CVE-2026-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23214"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2024-56671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56671"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2025-62626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62626"
},
{
"name": "CVE-2025-39940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39940"
},
{
"name": "CVE-2023-52751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52751"
},
{
"name": "CVE-2022-49562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49562"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2023-53483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53483"
},
{
"name": "CVE-2023-53673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53673"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-37746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37746"
},
{
"name": "CVE-2022-38076",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38076"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2026-23178",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23178"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2024-56368",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2022-49172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49172"
},
{
"name": "CVE-2024-40979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40979"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2026-23240",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23240"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2026-23228",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23228"
},
{
"name": "CVE-2024-49945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49945"
},
{
"name": "CVE-2022-44033",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44033"
},
{
"name": "CVE-2024-56757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56757"
},
{
"name": "CVE-2023-53662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53662"
},
{
"name": "CVE-2025-38069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38069"
},
{
"name": "CVE-2022-49750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49750"
},
{
"name": "CVE-2023-53707",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53707"
},
{
"name": "CVE-2023-53115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53115"
},
{
"name": "CVE-2025-71196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71196"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2023-54107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54107"
},
{
"name": "CVE-2022-48646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48646"
},
{
"name": "CVE-2024-43912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43912"
},
{
"name": "CVE-2024-35808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35808"
},
{
"name": "CVE-2024-58012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58012"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-61663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61663"
},
{
"name": "CVE-2025-68772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68772"
},
{
"name": "CVE-2024-49891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49891"
},
{
"name": "CVE-2024-36948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36948"
},
{
"name": "CVE-2022-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48887"
},
{
"name": "CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"name": "CVE-2024-26948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26948"
},
{
"name": "CVE-2023-53370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53370"
},
{
"name": "CVE-2024-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53187"
},
{
"name": "CVE-2023-45929",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45929"
},
{
"name": "CVE-2025-68343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68343"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2024-57795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57795"
},
{
"name": "CVE-2025-37855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37855"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2021-33115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33115"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2020-26559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26559"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2024-39508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39508"
},
{
"name": "CVE-2026-23191",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23191"
},
{
"name": "CVE-2026-32249",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32249"
},
{
"name": "CVE-2025-37899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37899"
},
{
"name": "CVE-2026-23078",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23078"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2024-43831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43831"
},
{
"name": "CVE-2023-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30630"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2026-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23169"
},
{
"name": "CVE-2025-38330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38330"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2017-13693",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13693"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2024-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50284"
},
{
"name": "CVE-2022-49306",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49306"
},
{
"name": "CVE-2024-49898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49898"
},
{
"name": "CVE-2025-36423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36423"
},
{
"name": "CVE-2022-49622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49622"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2024-50211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50211"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2022-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50284"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2023-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22028"
},
{
"name": "CVE-2024-41008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41008"
},
{
"name": "CVE-2024-27035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27035"
},
{
"name": "CVE-2023-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53218"
},
{
"name": "CVE-2022-25836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25836"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-29934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29934"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2022-49133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49133"
},
{
"name": "CVE-2024-36951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36951"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2025-38438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38438"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2023-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26555"
},
{
"name": "CVE-2023-1193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1193"
},
{
"name": "CVE-2025-71220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71220"
},
{
"name": "CVE-2024-46806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46806"
},
{
"name": "CVE-2022-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50073"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2026-23103",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23103"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-68786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68786"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2022-50393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50393"
},
{
"name": "CVE-2025-68779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68779"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-21819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21819"
},
{
"name": "CVE-2025-48514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48514"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2025-71199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71199"
},
{
"name": "CVE-2024-47664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47664"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2026-25749",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25749"
},
{
"name": "CVE-2024-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49504"
},
{
"name": "CVE-2025-38118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53367"
},
{
"name": "CVE-2022-50500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50500"
},
{
"name": "CVE-2019-14899",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14899"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2024-53098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53098"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2026-23180",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23180"
},
{
"name": "CVE-2021-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0164"
},
{
"name": "CVE-2024-46870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46870"
},
{
"name": "CVE-2022-49178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49178"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2024-49929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49929"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2023-53748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53748"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2022-49173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49173"
},
{
"name": "CVE-2024-45781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45781"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2024-53056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53056"
},
{
"name": "CVE-2022-50551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50551"
},
{
"name": "CVE-2026-26269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26269"
},
{
"name": "CVE-2024-43872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43872"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2025-71069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71069"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2023-52939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52939"
},
{
"name": "CVE-2024-14027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-14027"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-69649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69649"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2024-49859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49859"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-71195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71195"
},
{
"name": "CVE-2022-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49766"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-22043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22043"
},
{
"name": "CVE-2024-49569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49569"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2023-52569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52569"
},
{
"name": "CVE-2024-56609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56609"
},
{
"name": "CVE-2022-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49940"
},
{
"name": "CVE-2026-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23083"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2024-56611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56611"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2026-23088",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23088"
},
{
"name": "CVE-2020-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25743"
},
{
"name": "CVE-2022-50167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50167"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2026-27704",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27704"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2023-45896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45896"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2024-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49940"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2021-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3735"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2024-46861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46861"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2022-50634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50634"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-54514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54514"
},
{
"name": "CVE-2025-71202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71202"
},
{
"name": "CVE-2015-7837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7837"
},
{
"name": "CVE-2025-0677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0677"
},
{
"name": "CVE-2024-45780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45780"
},
{
"name": "CVE-2024-46749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46749"
},
{
"name": "CVE-2022-50492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50492"
},
{
"name": "CVE-2024-49888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49888"
},
{
"name": "CVE-2022-50406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50406"
},
{
"name": "CVE-2023-26552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26552"
},
{
"name": "CVE-2024-49921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49921"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2026-23108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23108"
},
{
"name": "CVE-2025-71180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71180"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-59691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59691"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2023-52481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52481"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2025-22057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22057"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2023-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
},
{
"name": "CVE-2024-50056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
},
{
"name": "CVE-2025-71194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71194"
},
{
"name": "CVE-2026-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1788"
},
{
"name": "CVE-2023-53721",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53721"
},
{
"name": "CVE-2025-22113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2022-50256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50256"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2025-37907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37907"
},
{
"name": "CVE-2024-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38625"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2023-4010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4010"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2024-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46727"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2023-54105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54105"
},
{
"name": "CVE-2018-17977",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17977"
},
{
"name": "CVE-2019-1010204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010204"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2026-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26960"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2022-50354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50354"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2026-23068",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23068"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2024-43823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43823"
},
{
"name": "CVE-2023-52589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52589"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2026-23216",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23216"
},
{
"name": "CVE-2023-53434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53434"
},
{
"name": "CVE-2023-29935",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29935"
},
{
"name": "CVE-2023-35061",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35061"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2025-71225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71225"
},
{
"name": "CVE-2026-21636",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21636"
},
{
"name": "CVE-2026-23239",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23239"
},
{
"name": "CVE-2021-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0172"
},
{
"name": "CVE-2024-47662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47662"
},
{
"name": "CVE-2018-12930",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12930"
},
{
"name": "CVE-2026-23071",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23071"
},
{
"name": "CVE-2024-49970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49970"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26844"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2026-23056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23056"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2023-32644",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32644"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2024-46681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46681"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-40012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40012"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2026-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0964"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2024-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47141"
},
{
"name": "CVE-2024-8354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8354"
},
{
"name": "CVE-2023-54323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54323"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2025-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0689"
},
{
"name": "CVE-2022-50316",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50316"
},
{
"name": "CVE-2023-31347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31347"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-22111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
},
{
"name": "CVE-2023-53657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53657"
},
{
"name": "CVE-2024-49915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49915"
},
{
"name": "CVE-2026-23063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23063"
},
{
"name": "CVE-2025-55132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55132"
},
{
"name": "CVE-2023-52732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52732"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2026-23073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23073"
},
{
"name": "CVE-2022-49167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49167"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2026-27903",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27903"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2024-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2025-0690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0690"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2023-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53052"
},
{
"name": "CVE-2026-23058",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23058"
},
{
"name": "CVE-2022-49234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49234"
},
{
"name": "CVE-2022-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50163"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2025-71067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71067"
},
{
"name": "CVE-2024-49919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49919"
},
{
"name": "CVE-2026-23238",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23238"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2020-26556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26556"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23038"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2021-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
},
{
"name": "CVE-2024-26699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26699"
},
{
"name": "CVE-2024-57876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57876"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2022-50390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50390"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-71186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71186"
},
{
"name": "CVE-2024-53220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53220"
},
{
"name": "CVE-2026-23176",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23176"
},
{
"name": "CVE-2023-53539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53539"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-68821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68821"
},
{
"name": "CVE-2025-31648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31648"
},
{
"name": "CVE-2026-1229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1229"
},
{
"name": "CVE-2025-0678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0678"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2026-23026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23026"
},
{
"name": "CVE-2024-56674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56674"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2024-31884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31884"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2019-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1563"
},
{
"name": "CVE-2026-23128",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23128"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2023-53574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53574"
},
{
"name": "CVE-2022-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50166"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-71190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71190"
},
{
"name": "CVE-2024-56738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56738"
},
{
"name": "CVE-2022-50778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50778"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2022-49971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49971"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2025-21693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21693"
},
{
"name": "CVE-2025-71203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71203"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2025-39789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39789"
},
{
"name": "CVE-2022-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49124"
},
{
"name": "CVE-2024-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49901"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2024-56583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56583"
},
{
"name": "CVE-2022-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50195"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2024-40998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
},
{
"name": "CVE-2024-56712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56712"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-52634",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52634"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2025-62526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62526"
},
{
"name": "CVE-2024-49918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49918"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-45776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45776"
},
{
"name": "CVE-2022-50090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50090"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2020-14356",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14356"
},
{
"name": "CVE-2025-68745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68745"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2023-53764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53764"
},
{
"name": "CVE-2024-53687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53687"
},
{
"name": "CVE-2025-39901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39901"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2024-38628",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38628"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-38672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38672"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2025-0684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0684"
},
{
"name": "CVE-2025-10158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10158"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2024-47794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47794"
},
{
"name": "CVE-2026-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23146"
},
{
"name": "CVE-2025-38272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38272"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2019-20794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20794"
},
{
"name": "CVE-2023-53849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53849"
},
{
"name": "CVE-2022-4543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4543"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2026-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23037"
},
{
"name": "CVE-2023-53627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53627"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-38091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38091"
},
{
"name": "CVE-2023-53510",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53510"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2023-53575",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53575"
},
{
"name": "CVE-2022-49516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49516"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2022-3523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3523"
},
{
"name": "CVE-2026-26157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26157"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2023-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38417"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-71224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71224"
},
{
"name": "CVE-2025-22072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22072"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2021-45261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45261"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2026-23193",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23193"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2024-47736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47736"
},
{
"name": "CVE-2023-53037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53037"
},
{
"name": "CVE-2024-46842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46842"
},
{
"name": "CVE-2025-71237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71237"
},
{
"name": "CVE-2025-13462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13462"
},
{
"name": "CVE-2024-50112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50112"
},
{
"name": "CVE-2025-69646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69646"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2026-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23215"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2020-26142",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26142"
},
{
"name": "CVE-2022-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49955"
},
{
"name": "CVE-2023-53628",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53628"
},
{
"name": "CVE-2025-29943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29943"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2023-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31346"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-38140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38140"
},
{
"name": "CVE-2022-50002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50002"
},
{
"name": "CVE-2025-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38621"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39908"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2024-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49920"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2026-23118",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23118"
},
{
"name": "CVE-2025-34034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-34034"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-59692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59692"
},
{
"name": "CVE-2022-50116",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50116"
},
{
"name": "CVE-2018-12931",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12931"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2022-50224",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50224"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2020-13791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13791"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2024-49990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49990"
},
{
"name": "CVE-2020-15802",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15802"
},
{
"name": "CVE-2020-24240",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24240"
},
{
"name": "CVE-2024-46718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46718"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2023-53545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53545"
},
{
"name": "CVE-2022-50552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50552"
},
{
"name": "CVE-2021-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0066"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2023-53376",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53376"
},
{
"name": "CVE-2023-53538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53538"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2022-50357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50357"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2023-52671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52671"
},
{
"name": "CVE-2022-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50303"
},
{
"name": "CVE-2024-35870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35870"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2026-23221",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23221"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-36013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36013"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2023-52676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52676"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2017-13165",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13165"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39932"
},
{
"name": "CVE-2024-47683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47683"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-46811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46811"
},
{
"name": "CVE-2025-21985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
},
{
"name": "CVE-2025-22109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2023-53635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53635"
},
{
"name": "CVE-2025-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39810"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-23132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23132"
},
{
"name": "CVE-2024-47678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47678"
},
{
"name": "CVE-2022-49531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49531"
},
{
"name": "CVE-2022-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49504"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2022-49810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49810"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-71109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71109"
},
{
"name": "CVE-2023-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26586"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-44950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44950"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2022-50332",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50332"
},
{
"name": "CVE-2023-53822",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53822"
},
{
"name": "CVE-2024-27408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27408"
},
{
"name": "CVE-2025-71222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71222"
},
{
"name": "CVE-2022-50461",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50461"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2023-26554",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26554"
},
{
"name": "CVE-2025-38486",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38486"
},
{
"name": "CVE-2021-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26934"
},
{
"name": "CVE-2023-53466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53466"
},
{
"name": "CVE-2025-21629",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21629"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-53168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53168"
},
{
"name": "CVE-2022-49528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49528"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2022-49218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49218"
},
{
"name": "CVE-2023-52749",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52749"
},
{
"name": "CVE-2025-39754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39754"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2022-49967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49967"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2022-49245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49245"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2023-52682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52682"
},
{
"name": "CVE-2022-50871",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50871"
},
{
"name": "CVE-2025-71150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71150"
},
{
"name": "CVE-2025-71229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71229"
},
{
"name": "CVE-2026-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23213"
},
{
"name": "CVE-2025-39958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39958"
},
{
"name": "CVE-2018-8956",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8956"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2026-23091",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23091"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2022-49420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49420"
},
{
"name": "CVE-2022-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40964"
},
{
"name": "CVE-2026-3441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3441"
},
{
"name": "CVE-2024-36244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36244"
},
{
"name": "CVE-2023-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53149"
},
{
"name": "CVE-2026-23237",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23237"
},
{
"name": "CVE-2024-49987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49987"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2022-50746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50746"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2024-50034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50034"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-71192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71192"
},
{
"name": "CVE-2023-53596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53596"
},
{
"name": "CVE-2022-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49943"
},
{
"name": "CVE-2022-50260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50260"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2026-23121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23121"
},
{
"name": "CVE-2020-12319",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12319"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-49568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49568"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2024-36924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36924"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2023-3397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3397"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2024-26672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26672"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2026-0965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0965"
},
{
"name": "CVE-2023-53806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53806"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2021-33139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33139"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-71236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71236"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2024-50057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50057"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2024-46808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46808"
},
{
"name": "CVE-2026-26158",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26158"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-68288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68288"
},
{
"name": "CVE-2025-38168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38168"
},
{
"name": "CVE-2023-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53547"
},
{
"name": "CVE-2019-20426",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20426"
},
{
"name": "CVE-2025-71107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71107"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2026-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29786"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-56584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56584"
},
{
"name": "CVE-2026-23235",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23235"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-71152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71152"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-56692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56692"
},
{
"name": "CVE-2024-53196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53196"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2022-50212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50212"
},
{
"name": "CVE-2026-23087",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23087"
},
{
"name": "CVE-2023-54259",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54259"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2025-1369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1369"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2023-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53231"
},
{
"name": "CVE-2025-71185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71185"
},
{
"name": "CVE-2022-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2961"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-49635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49635"
},
{
"name": "CVE-2024-50017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50017"
},
{
"name": "CVE-2026-23096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23096"
},
{
"name": "CVE-2024-53241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53241"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-33155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33155"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2024-57899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57899"
},
{
"name": "CVE-2024-49928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49928"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2024-50187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50187"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2025-36001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36001"
},
{
"name": "CVE-2022-50464",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50464"
},
{
"name": "CVE-2025-38674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38674"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2020-26560",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26560"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-45777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45777"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2022-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49965"
},
{
"name": "CVE-2025-54771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54771"
},
{
"name": "CVE-2024-0564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0564"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2022-49961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49961"
},
{
"name": "CVE-2025-69651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69651"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2024-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58098"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2022-28667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28667"
},
{
"name": "CVE-2023-53383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53383"
},
{
"name": "CVE-2024-46717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46717"
},
{
"name": "CVE-2024-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25743"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2026-23164",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23164"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2025-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0033"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2024-42319",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42319"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-13716",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13716"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2024-36024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36024"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2023-52879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52879"
},
{
"name": "CVE-2025-68281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68281"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2025-38440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38440"
},
{
"name": "CVE-2026-23124",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23124"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2024-53224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53224"
},
{
"name": "CVE-2024-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49910"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2023-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53105"
},
{
"name": "CVE-2025-68236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68236"
},
{
"name": "CVE-2024-39286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39286"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-68333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68333"
},
{
"name": "CVE-2024-47689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47689"
},
{
"name": "CVE-2025-71160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71160"
},
{
"name": "CVE-2025-71232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71232"
},
{
"name": "CVE-2023-52625",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52625"
},
{
"name": "CVE-2023-53353",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53353"
},
{
"name": "CVE-2024-58096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2023-53401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53401"
},
{
"name": "CVE-2025-22037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22037"
},
{
"name": "CVE-2023-53702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53702"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2023-54059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54059"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2021-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0170"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2024-53133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53133"
},
{
"name": "CVE-2026-23075",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23075"
},
{
"name": "CVE-2022-50571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50571"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2026-23120",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23120"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2022-49393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49393"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2025-39851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39851"
},
{
"name": "CVE-2025-71204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71204"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-26758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26758"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2023-32651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32651"
},
{
"name": "CVE-2025-37747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37747"
},
{
"name": "CVE-2026-2297",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2297"
},
{
"name": "CVE-2026-23105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23105"
},
{
"name": "CVE-2023-53036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53036"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-71115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71115"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2022-50862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50862"
},
{
"name": "CVE-2025-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1118"
},
{
"name": "CVE-2024-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50166"
},
{
"name": "CVE-2024-35862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35862"
},
{
"name": "CVE-2023-53355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53355"
},
{
"name": "CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"name": "CVE-2026-0967",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0967"
},
{
"name": "CVE-2026-23181",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23181"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2023-53558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53558"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-68214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68214"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2026-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23141"
},
{
"name": "CVE-2026-22860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22860"
},
{
"name": "CVE-2025-36365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36365"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2025-40247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40247"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-56641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2025-0686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0686"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2024-49992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49992"
},
{
"name": "CVE-2025-68781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68781"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2026-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23182"
},
{
"name": "CVE-2021-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0173"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2024-45778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45778"
},
{
"name": "CVE-2026-23086",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23086"
},
{
"name": "CVE-2024-47661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47661"
},
{
"name": "CVE-2026-28418",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28418"
},
{
"name": "CVE-2023-54151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54151"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2024-46803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46803"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-59466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59466"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2022-36351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36351"
},
{
"name": "CVE-2023-52921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52921"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2024-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36478"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2026-1299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1299"
},
{
"name": "CVE-2024-54683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54683"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2024-46720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46720"
},
{
"name": "CVE-2024-26658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26658"
},
{
"name": "CVE-2026-2243",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2243"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2021-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0174"
},
{
"name": "CVE-2025-8746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8746"
},
{
"name": "CVE-2025-36442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36442"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2026-0968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0968"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-45779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45779"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2024-57857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57857"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-50213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50213"
},
{
"name": "CVE-2024-46823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46823"
},
{
"name": "CVE-2023-32642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32642"
},
{
"name": "CVE-2025-71227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71227"
},
{
"name": "CVE-2024-46733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46733"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2022-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50015"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2024-7883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7883"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2022-50772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50772"
},
{
"name": "CVE-2024-56717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56717"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2023-54234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54234"
},
{
"name": "CVE-2022-45885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45885"
},
{
"name": "CVE-2022-49783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49783"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2025-47153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47153"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2024-53216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53216"
},
{
"name": "CVE-2022-49539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49539"
},
{
"name": "CVE-2024-36347",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36347"
},
{
"name": "CVE-2024-26869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26869"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2021-20255",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20255"
},
{
"name": "CVE-2022-48979",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48979"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-71193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71193"
},
{
"name": "CVE-2023-54180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54180"
},
{
"name": "CVE-2026-23095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23095"
},
{
"name": "CVE-2024-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46848"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2024-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36009"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2023-25951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25951"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2023-53152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53152"
},
{
"name": "CVE-2021-0308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0308"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2024-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50009"
},
{
"name": "CVE-2025-39850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39850"
},
{
"name": "CVE-2022-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1205"
},
{
"name": "CVE-2023-45927",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45927"
},
{
"name": "CVE-2020-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25742"
},
{
"name": "CVE-2022-0987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0987"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-38199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38199"
},
{
"name": "CVE-2025-39905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39905"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2022-50720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50720"
},
{
"name": "CVE-2025-71105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71105"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2022-49529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49529"
},
{
"name": "CVE-2025-68266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68266"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2024-26876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26876"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2023-52657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52657"
},
{
"name": "CVE-2025-37876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37876"
},
{
"name": "CVE-2024-58089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58089"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2026-27571",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27571"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2026-27139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27139"
},
{
"name": "CVE-2022-49127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49127"
},
{
"name": "CVE-2020-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25741"
},
{
"name": "CVE-2022-50748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50748"
},
{
"name": "CVE-2023-53767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53767"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-39863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39863"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2023-53180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53180"
},
{
"name": "CVE-2026-28419",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28419"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2023-53385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53385"
},
{
"name": "CVE-2026-23206",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23206"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2024-46678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46678"
},
{
"name": "CVE-2024-58097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
},
{
"name": "CVE-2023-53620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53620"
},
{
"name": "CVE-2022-50539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50539"
},
{
"name": "CVE-2025-71068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71068"
},
{
"name": "CVE-2025-23130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23130"
},
{
"name": "CVE-2022-49496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49496"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2024-56782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56782"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2023-53540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53540"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-53261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53261"
},
{
"name": "CVE-2026-23033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23033"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2023-54187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54187"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2026-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23145"
},
{
"name": "CVE-2022-44032",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44032"
},
{
"name": "CVE-2024-57895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57895"
},
{
"name": "CVE-2023-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53240"
},
{
"name": "CVE-2025-13735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13735"
},
{
"name": "CVE-2023-53694",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53694"
},
{
"name": "CVE-2024-53195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53195"
},
{
"name": "CVE-2024-35794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35794"
},
{
"name": "CVE-2023-52829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52829"
},
{
"name": "CVE-2026-23003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23003"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-56660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56660"
},
{
"name": "CVE-2026-23076",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23076"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2025-38033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38033"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-47704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47704"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-49978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49978"
},
{
"name": "CVE-2024-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36910"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2025-36366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36366"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2025-36123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36123"
},
{
"name": "CVE-2024-56737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56737"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2020-11935",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11935"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-22042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22042"
},
{
"name": "CVE-2025-71158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71158"
},
{
"name": "CVE-2022-49803",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49803"
},
{
"name": "CVE-2024-57898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57898"
},
{
"name": "CVE-2020-35503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35503"
},
{
"name": "CVE-2024-49923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49923"
},
{
"name": "CVE-2024-56639",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56639"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23171"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-53002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53002"
},
{
"name": "CVE-2021-0183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0183"
},
{
"name": "CVE-2025-39884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39884"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"name": "CVE-2024-35826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35826"
},
{
"name": "CVE-2026-23112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23112"
},
{
"name": "CVE-2022-49764",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49764"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-21651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21651"
},
{
"name": "CVE-2025-38092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38092"
},
{
"name": "CVE-2025-22124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2023-26553",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26553"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-37776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37776"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2024-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6519"
},
{
"name": "CVE-2024-46729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46729"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-50266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50266"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2026-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23084"
},
{
"name": "CVE-2023-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53093"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2026-23190",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23190"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2026-22979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22979"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2024-49991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49991"
},
{
"name": "CVE-2022-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50009"
},
{
"name": "CVE-2022-26047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26047"
},
{
"name": "CVE-2024-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53240"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-37877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37877"
},
{
"name": "CVE-2024-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2193"
},
{
"name": "CVE-2025-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4382"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2025-71161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71161"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-22038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22038"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2022-48816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48816"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-50518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50518"
},
{
"name": "CVE-2022-49829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49829"
},
{
"name": "CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2016-2568",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2568"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2018-12929",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12929"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2024-53147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53147"
},
{
"name": "CVE-2025-39952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39952"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2024-45783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45783"
},
{
"name": "CVE-2026-23110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23110"
},
{
"name": "CVE-2023-53410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53410"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2023-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47210"
},
{
"name": "CVE-2025-68809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68809"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2021-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0165"
},
{
"name": "CVE-2025-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
},
{
"name": "CVE-2022-49177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49177"
},
{
"name": "CVE-2025-38205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38205"
},
{
"name": "CVE-2026-23100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23100"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2024-58241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58241"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2022-49833",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49833"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-68282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68282"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-68817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68817"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2024-46726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46726"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2024-53079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53079"
},
{
"name": "CVE-2025-68787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68787"
},
{
"name": "CVE-2025-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1125"
},
{
"name": "CVE-2023-53647",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53647"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
},
{
"name": "CVE-2025-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0012"
},
{
"name": "CVE-2020-12313",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12313"
},
{
"name": "CVE-2025-71233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71233"
},
{
"name": "CVE-2025-68782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68782"
},
{
"name": "CVE-2021-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0166"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2022-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3872"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-71197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71197"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2024-49931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49931"
},
{
"name": "CVE-2024-43866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43866"
},
{
"name": "CVE-2024-37021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37021"
},
{
"name": "CVE-2024-47728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47728"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2026-23031",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23031"
},
{
"name": "CVE-2024-46730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46730"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2025-71127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71127"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2024-46728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46728"
},
{
"name": "CVE-2023-53561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53561"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2026-23050",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23050"
},
{
"name": "CVE-2024-58100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58100"
},
{
"name": "CVE-2020-0256",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0256"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-26954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26954"
},
{
"name": "CVE-2025-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21634"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2025-38047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38047"
},
{
"name": "CVE-2024-47738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47738"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2024-41013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41013"
},
{
"name": "CVE-2023-54320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54320"
},
{
"name": "CVE-2024-43911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43911"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2017-0537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0537"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2025-68219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68219"
},
{
"name": "CVE-2022-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50232"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2023-26112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26112"
},
{
"name": "CVE-2018-6952",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6952"
},
{
"name": "CVE-2020-14304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14304"
},
{
"name": "CVE-2024-46834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46834"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2026-24001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24001"
},
{
"name": "CVE-2025-37807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37807"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2022-50016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50016"
},
{
"name": "CVE-2025-29481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29481"
},
{
"name": "CVE-2024-53219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53219"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-61661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61661"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2024-25740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25740"
},
{
"name": "CVE-2024-50246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50246"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-57950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57950"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2025-40325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2026-23113",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23113"
},
{
"name": "CVE-2021-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0176"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2022-48998",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48998"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2024-42273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42273"
},
{
"name": "CVE-2025-68336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68336"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2026-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23157"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2022-49974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49974"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2019-20633",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20633"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2021-3714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3714"
},
{
"name": "CVE-2023-54071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54071"
},
{
"name": "CVE-2024-56566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56566"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-47745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47745"
},
{
"name": "CVE-2025-39833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39833"
},
{
"name": "CVE-2026-23097",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23097"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2024-53190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53190"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2024-35784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35784"
},
{
"name": "CVE-2024-56591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56591"
},
{
"name": "CVE-2024-56544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56544"
},
{
"name": "CVE-2024-56647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56647"
},
{
"name": "CVE-2025-71198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71198"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2024-57976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57976"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2025-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0685"
},
{
"name": "CVE-2024-57893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57893"
},
{
"name": "CVE-2026-23231",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23231"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2022-50071",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50071"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2024-56180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56180"
},
{
"name": "CVE-2023-39333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39333"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2021-3864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3864"
},
{
"name": "CVE-2025-39771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39771"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2024-26648",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26648"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2020-24352",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24352"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2022-49296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49296"
},
{
"name": "CVE-2024-49914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49914"
},
{
"name": "CVE-2025-38360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38360"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-36407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36407"
},
{
"name": "CVE-2024-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0217"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2021-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47658"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2019-12067",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12067"
},
{
"name": "CVE-2024-57843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57843"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2024-50135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50135"
},
{
"name": "CVE-2024-49916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49916"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2024-49988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49988"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2024-49861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49861"
},
{
"name": "CVE-2026-23093",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23093"
},
{
"name": "CVE-2024-49893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49893"
},
{
"name": "CVE-2024-44963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44963"
},
{
"name": "CVE-2023-53348",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53348"
},
{
"name": "CVE-2022-48766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48766"
},
{
"name": "CVE-2019-15794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15794"
},
{
"name": "CVE-2024-49917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49917"
},
{
"name": "CVE-2022-50467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50467"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2024-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48875"
},
{
"name": "CVE-2024-41935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41935"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2025-71183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71183"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2023-53382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53382"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2025-39677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39677"
},
{
"name": "CVE-2023-53651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53651"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2025-68371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68371"
},
{
"name": "CVE-2022-50383",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50383"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-53387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53387"
},
{
"name": "CVE-2026-31802",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31802"
},
{
"name": "CVE-2024-45774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45774"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2025-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
},
{
"name": "CVE-2025-61664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61664"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2026-25702",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25702"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2022-50863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50863"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2024-35843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35843"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-39762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39762"
},
{
"name": "CVE-2024-40999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40999"
},
{
"name": "CVE-2023-53292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53292"
},
{
"name": "CVE-2023-52576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52576"
},
{
"name": "CVE-2024-27002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27002"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-57887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57887"
},
{
"name": "CVE-2025-21730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21730"
},
{
"name": "CVE-2024-35865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35865"
},
{
"name": "CVE-2025-71184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71184"
},
{
"name": "CVE-2023-52660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52660"
},
{
"name": "CVE-2024-35995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35995"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2023-53371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53371"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22041"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-22127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22127"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2024-27011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27011"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"name": "CVE-2024-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38543"
},
{
"name": "CVE-2025-68263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68263"
},
{
"name": "CVE-2023-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53187"
},
{
"name": "CVE-2025-38689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38689"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2022-48744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48744"
},
{
"name": "CVE-2025-38070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38070"
},
{
"name": "CVE-2025-68755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68755"
},
{
"name": "CVE-2025-62525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62525"
},
{
"name": "CVE-2025-71238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71238"
},
{
"name": "CVE-2021-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0175"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2022-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48706"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2024-46716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46716"
},
{
"name": "CVE-2012-4542",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4542"
},
{
"name": "CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2022-49267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49267"
},
{
"name": "CVE-2024-56592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56592"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-38189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38189"
},
{
"name": "CVE-2022-48628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48628"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-50138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50138"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2021-44534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44534"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"name": "CVE-2024-56565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56565"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2024-57872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57872"
},
{
"name": "CVE-2023-28720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28720"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2026-23080",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23080"
},
{
"name": "CVE-2024-46833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46833"
},
{
"name": "CVE-2024-47703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47703"
},
{
"name": "CVE-2023-53742",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53742"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38041"
},
{
"name": "CVE-2024-53177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53177"
},
{
"name": "CVE-2024-56588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56588"
},
{
"name": "CVE-2023-53452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53452"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2022-50616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50616"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2023-53544",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53544"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2024-49911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49911"
},
{
"name": "CVE-2026-23154",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23154"
},
{
"name": "CVE-2022-50708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50708"
},
{
"name": "CVE-2026-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3784"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
},
{
"name": "CVE-2025-9301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9301"
}
],
"initial_release_date": "2026-03-19T00:00:00",
"last_revision_date": "2026-03-19T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0316",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37219",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37219"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37211",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37211"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37215",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37215"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37218",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37218"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37220",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37220"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37216",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37216"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37221",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37221"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37213",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37213"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37217",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37217"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37212",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37212"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37214",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37214"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37222",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37222"
}
]
}
CERTFR-2026-AVI-0328
Vulnerability from certfr_avis - Published: 2026-03-20 - Updated: 2026-03-20
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian LTS. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et un déni de service.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian LTS bullseye versions ant\u00e9rieures \u00e0 6.1.164-1~deb11u1",
"product": {
"name": "Debian",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "Debian LTS bullseye versions ant\u00e9rieures \u00e0 5.10.251-1",
"product": {
"name": "Debian",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-23198",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23198"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38201"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2026-23220",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23220"
},
{
"name": "CVE-2026-23187",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2026-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23222"
},
{
"name": "CVE-2026-23229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23229"
},
{
"name": "CVE-2026-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23209"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2026-23236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23236"
},
{
"name": "CVE-2025-71235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71235"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-71144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71144"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2023-53424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53424"
},
{
"name": "CVE-2026-23234",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23234"
},
{
"name": "CVE-2026-23230",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23230"
},
{
"name": "CVE-2026-23178",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23178"
},
{
"name": "CVE-2026-23228",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23228"
},
{
"name": "CVE-2026-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23169"
},
{
"name": "CVE-2025-71220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71220"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2026-23180",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23180"
},
{
"name": "CVE-2026-23216",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23216"
},
{
"name": "CVE-2026-23238",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23238"
},
{
"name": "CVE-2026-23176",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23176"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2025-71224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71224"
},
{
"name": "CVE-2026-23193",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23193"
},
{
"name": "CVE-2025-71237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71237"
},
{
"name": "CVE-2026-23221",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23221"
},
{
"name": "CVE-2026-23205",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23205"
},
{
"name": "CVE-2025-71222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71222"
},
{
"name": "CVE-2026-23237",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23237"
},
{
"name": "CVE-2025-71236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71236"
},
{
"name": "CVE-2026-23235",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23235"
},
{
"name": "CVE-2024-26822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26822"
},
{
"name": "CVE-2025-71232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71232"
},
{
"name": "CVE-2026-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23182"
},
{
"name": "CVE-2026-23206",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23206"
},
{
"name": "CVE-2024-57895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57895"
},
{
"name": "CVE-2026-23112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23112"
},
{
"name": "CVE-2026-23190",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23190"
},
{
"name": "CVE-2022-50516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50516"
},
{
"name": "CVE-2025-71233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71233"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2025-71238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71238"
}
],
"initial_release_date": "2026-03-20T00:00:00",
"last_revision_date": "2026-03-20T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0328",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de Debian LTS. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un d\u00e9ni de service.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian LTS",
"vendor_advisories": [
{
"published_at": "2026-03-13",
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS DLA-4499-1",
"url": "https://lists.debian.org/debian-lts-announce/2026/03/msg00003.html"
},
{
"published_at": "2026-03-13",
"title": "Bulletin de s\u00e9curit\u00e9 Debian LTS DLA-4498-1",
"url": "https://lists.debian.org/debian-lts-announce/2026/03/msg00002.html"
}
]
}
WID-SEC-W-2026-0614
Vulnerability from csaf_certbund - Published: 2026-03-04 23:00 - Updated: 2026-03-30 22:00| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen im Linux-Kernel ausnutzen, um nicht n\u00e4her spezifizierte Angriffe durchzuf\u00fchren, die m\u00f6glicherweise zu einer Denial-of-Service-Bedingung f\u00fchren oder eine Speicherbesch\u00e4digung verursachen k\u00f6nnen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0614 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0614.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0614 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0614"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2025-71238",
"url": "https://lore.kernel.org/linux-cve-announce/2026030437-CVE-2025-71238-76bc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23231",
"url": "https://lore.kernel.org/linux-cve-announce/2026030436-CVE-2026-23231-1a96@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23232",
"url": "https://lore.kernel.org/linux-cve-announce/2026030439-CVE-2026-23232-b24d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23233",
"url": "https://lore.kernel.org/linux-cve-announce/2026030439-CVE-2026-23233-4413@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23234",
"url": "https://lore.kernel.org/linux-cve-announce/2026030439-CVE-2026-23234-5cef@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23235",
"url": "https://lore.kernel.org/linux-cve-announce/2026030440-CVE-2026-23235-3b8d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23236",
"url": "https://lore.kernel.org/linux-cve-announce/2026030440-CVE-2026-23236-b419@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23237",
"url": "https://lore.kernel.org/linux-cve-announce/2026030436-CVE-2026-23237-f6fb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-23238",
"url": "https://lore.kernel.org/linux-cve-announce/2026030436-CVE-2026-23238-47f3@gregkh/"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2026-03-05",
"url": "https://msrc.microsoft.com/update-guide/"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2026-03-10",
"url": "https://msrc.microsoft.com/update-guide/"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6162 vom 2026-03-13",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00072.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6163 vom 2026-03-13",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00071.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4498 vom 2026-03-13",
"url": "https://lists.debian.org/debian-lts-announce/2026/03/msg00002.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4499 vom 2026-03-13",
"url": "https://lists.debian.org/debian-lts-announce/2026/03/msg00003.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.10-2026-114 vom 2026-03-19",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.10-2026-114.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50160 vom 2026-03-24",
"url": "https://linux.oracle.com/errata/ELSA-2026-50160.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-6053 vom 2026-03-31",
"url": "https://linux.oracle.com/errata/ELSA-2026-6053.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:6053 vom 2026-03-30",
"url": "https://access.redhat.com/errata/RHSA-2026:6053"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-03-30T22:00:00.000+00:00",
"generator": {
"date": "2026-03-31T08:19:42.645+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0614",
"initial_release_date": "2026-03-04T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-03-04T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-03-10T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2026-03-12T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-03-15T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-03-19T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2026-03-23T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-03-30T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "azl3",
"product": {
"name": "Microsoft Azure Linux azl3",
"product_id": "T049210",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:azure_linux:azl3"
}
}
}
],
"category": "product_name",
"name": "Azure Linux"
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T051452",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-71238",
"product_status": {
"known_affected": [
"2951",
"67646",
"398363",
"T049210",
"T004914",
"T051452"
]
},
"release_date": "2026-03-04T23:00:00.000+00:00",
"title": "CVE-2025-71238"
},
{
"cve": "CVE-2026-23231",
"product_status": {
"known_affected": [
"2951",
"67646",
"398363",
"T049210",
"T004914",
"T051452"
]
},
"release_date": "2026-03-04T23:00:00.000+00:00",
"title": "CVE-2026-23231"
},
{
"cve": "CVE-2026-23232",
"product_status": {
"known_affected": [
"2951",
"67646",
"398363",
"T049210",
"T004914",
"T051452"
]
},
"release_date": "2026-03-04T23:00:00.000+00:00",
"title": "CVE-2026-23232"
},
{
"cve": "CVE-2026-23233",
"product_status": {
"known_affected": [
"2951",
"67646",
"398363",
"T049210",
"T004914",
"T051452"
]
},
"release_date": "2026-03-04T23:00:00.000+00:00",
"title": "CVE-2026-23233"
},
{
"cve": "CVE-2026-23234",
"product_status": {
"known_affected": [
"2951",
"67646",
"398363",
"T049210",
"T004914",
"T051452"
]
},
"release_date": "2026-03-04T23:00:00.000+00:00",
"title": "CVE-2026-23234"
},
{
"cve": "CVE-2026-23235",
"product_status": {
"known_affected": [
"2951",
"67646",
"398363",
"T049210",
"T004914",
"T051452"
]
},
"release_date": "2026-03-04T23:00:00.000+00:00",
"title": "CVE-2026-23235"
},
{
"cve": "CVE-2026-23236",
"product_status": {
"known_affected": [
"2951",
"67646",
"398363",
"T049210",
"T004914",
"T051452"
]
},
"release_date": "2026-03-04T23:00:00.000+00:00",
"title": "CVE-2026-23236"
},
{
"cve": "CVE-2026-23237",
"product_status": {
"known_affected": [
"2951",
"67646",
"398363",
"T049210",
"T004914",
"T051452"
]
},
"release_date": "2026-03-04T23:00:00.000+00:00",
"title": "CVE-2026-23237"
},
{
"cve": "CVE-2026-23238",
"product_status": {
"known_affected": [
"2951",
"67646",
"398363",
"T049210",
"T004914",
"T051452"
]
},
"release_date": "2026-03-04T23:00:00.000+00:00",
"title": "CVE-2026-23238"
}
]
}
GHSA-7HGF-78M2-X598
Vulnerability from github – Published: 2026-03-04 15:30 – Updated: 2026-03-17 21:31In the Linux kernel, the following vulnerability has been resolved:
scsi: qla2xxx: Fix bsg_done() causing double free
Kernel panic observed on system,
[5353358.825191] BUG: unable to handle page fault for address: ff5f5e897b024000 [5353358.825194] #PF: supervisor write access in kernel mode [5353358.825195] #PF: error_code(0x0002) - not-present page [5353358.825196] PGD 100006067 P4D 0 [5353358.825198] Oops: 0002 [#1] PREEMPT SMP NOPTI [5353358.825200] CPU: 5 PID: 2132085 Comm: qlafwupdate.sub Kdump: loaded Tainted: G W L ------- --- 5.14.0-503.34.1.el9_5.x86_64 #1 [5353358.825203] Hardware name: HPE ProLiant DL360 Gen11/ProLiant DL360 Gen11, BIOS 2.44 01/17/2025 [5353358.825204] RIP: 0010:memcpy_erms+0x6/0x10 [5353358.825211] RSP: 0018:ff591da8f4f6b710 EFLAGS: 00010246 [5353358.825212] RAX: ff5f5e897b024000 RBX: 0000000000007090 RCX: 0000000000001000 [5353358.825213] RDX: 0000000000001000 RSI: ff591da8f4fed090 RDI: ff5f5e897b024000 [5353358.825214] RBP: 0000000000010000 R08: ff5f5e897b024000 R09: 0000000000000000 [5353358.825215] R10: ff46cf8c40517000 R11: 0000000000000001 R12: 0000000000008090 [5353358.825216] R13: ff591da8f4f6b720 R14: 0000000000001000 R15: 0000000000000000 [5353358.825218] FS: 00007f1e88d47740(0000) GS:ff46cf935f940000(0000) knlGS:0000000000000000 [5353358.825219] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [5353358.825220] CR2: ff5f5e897b024000 CR3: 0000000231532004 CR4: 0000000000771ef0 [5353358.825221] PKRU: 55555554 [5353358.825222] Call Trace: [5353358.825223] [5353358.825224] ? show_trace_log_lvl+0x1c4/0x2df [5353358.825229] ? show_trace_log_lvl+0x1c4/0x2df [5353358.825232] ? sg_copy_buffer+0xc8/0x110 [5353358.825236] ? __die_body.cold+0x8/0xd [5353358.825238] ? page_fault_oops+0x134/0x170 [5353358.825242] ? kernelmode_fixup_or_oops+0x84/0x110 [5353358.825244] ? exc_page_fault+0xa8/0x150 [5353358.825247] ? asm_exc_page_fault+0x22/0x30 [5353358.825252] ? memcpy_erms+0x6/0x10 [5353358.825253] sg_copy_buffer+0xc8/0x110 [5353358.825259] qla2x00_process_vendor_specific+0x652/0x1320 [qla2xxx] [5353358.825317] qla24xx_bsg_request+0x1b2/0x2d0 [qla2xxx]
Most routines in qla_bsg.c call bsg_done() only for success cases. However a few invoke it for failure case as well leading to a double free. Validate before calling bsg_done().
{
"affected": [],
"aliases": [
"CVE-2025-71238"
],
"database_specific": {
"cwe_ids": [
"CWE-415"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-03-04T15:16:12Z",
"severity": "HIGH"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix bsg_done() causing double free\n\nKernel panic observed on system,\n\n[5353358.825191] BUG: unable to handle page fault for address: ff5f5e897b024000\n[5353358.825194] #PF: supervisor write access in kernel mode\n[5353358.825195] #PF: error_code(0x0002) - not-present page\n[5353358.825196] PGD 100006067 P4D 0\n[5353358.825198] Oops: 0002 [#1] PREEMPT SMP NOPTI\n[5353358.825200] CPU: 5 PID: 2132085 Comm: qlafwupdate.sub Kdump: loaded Tainted: G W L ------- --- 5.14.0-503.34.1.el9_5.x86_64 #1\n[5353358.825203] Hardware name: HPE ProLiant DL360 Gen11/ProLiant DL360 Gen11, BIOS 2.44 01/17/2025\n[5353358.825204] RIP: 0010:memcpy_erms+0x6/0x10\n[5353358.825211] RSP: 0018:ff591da8f4f6b710 EFLAGS: 00010246\n[5353358.825212] RAX: ff5f5e897b024000 RBX: 0000000000007090 RCX: 0000000000001000\n[5353358.825213] RDX: 0000000000001000 RSI: ff591da8f4fed090 RDI: ff5f5e897b024000\n[5353358.825214] RBP: 0000000000010000 R08: ff5f5e897b024000 R09: 0000000000000000\n[5353358.825215] R10: ff46cf8c40517000 R11: 0000000000000001 R12: 0000000000008090\n[5353358.825216] R13: ff591da8f4f6b720 R14: 0000000000001000 R15: 0000000000000000\n[5353358.825218] FS: 00007f1e88d47740(0000) GS:ff46cf935f940000(0000) knlGS:0000000000000000\n[5353358.825219] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[5353358.825220] CR2: ff5f5e897b024000 CR3: 0000000231532004 CR4: 0000000000771ef0\n[5353358.825221] PKRU: 55555554\n[5353358.825222] Call Trace:\n[5353358.825223] \u003cTASK\u003e\n[5353358.825224] ? show_trace_log_lvl+0x1c4/0x2df\n[5353358.825229] ? show_trace_log_lvl+0x1c4/0x2df\n[5353358.825232] ? sg_copy_buffer+0xc8/0x110\n[5353358.825236] ? __die_body.cold+0x8/0xd\n[5353358.825238] ? page_fault_oops+0x134/0x170\n[5353358.825242] ? kernelmode_fixup_or_oops+0x84/0x110\n[5353358.825244] ? exc_page_fault+0xa8/0x150\n[5353358.825247] ? asm_exc_page_fault+0x22/0x30\n[5353358.825252] ? memcpy_erms+0x6/0x10\n[5353358.825253] sg_copy_buffer+0xc8/0x110\n[5353358.825259] qla2x00_process_vendor_specific+0x652/0x1320 [qla2xxx]\n[5353358.825317] qla24xx_bsg_request+0x1b2/0x2d0 [qla2xxx]\n\nMost routines in qla_bsg.c call bsg_done() only for success cases.\nHowever a few invoke it for failure case as well leading to a double\nfree. Validate before calling bsg_done().",
"id": "GHSA-7hgf-78m2-x598",
"modified": "2026-03-17T21:31:42Z",
"published": "2026-03-04T15:30:35Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-71238"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/057a5bdc481e58ab853117254867ffb22caf9f6e"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/27ac9679c43a09e54e2d9aae9980ada045b428e0"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/31f33b856d2324d86bcaef295f4d210477a1c018"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/708003e1bc857dd014d4c44278d7d77c26f91b1c"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/74e7458537cd9349cf019862e51491f670871707"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/871f6236da96c4a9712b8a29d7f555f767a47e95"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/c2c68225b1456f4d0d393b5a8778d51bb0d5b1d0"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/f2bbb4db0e4a4fbd5e649c0b5d8733f61da24720"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
OPENSUSE-SU-2026:10387-1
Vulnerability from csaf_opensuse - Published: 2026-03-18 00:00 - Updated: 2026-03-18 00:00| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-devel-6.19.8-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-devel-6.19.8-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10387",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10387-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71229 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71230 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71230/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71231 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71232 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71233 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71234 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71235 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71235/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71236 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71236/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71237 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71237/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71238 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23220 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23221 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23222 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23223 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23223/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23224 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23224/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23225 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23225/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23226 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23226/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23227 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23227/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23228 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23228/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23229 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23230 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23230/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23231 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23232 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23233 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23234 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23235 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23235/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23236 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23236/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23239 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23240 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23240/"
}
],
"title": "kernel-devel-6.19.8-1.1 on GA media",
"tracking": {
"current_release_date": "2026-03-18T00:00:00Z",
"generator": {
"date": "2026-03-18T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10387-1",
"initial_release_date": "2026-03-18T00:00:00Z",
"revision_history": [
{
"date": "2026-03-18T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.19.8-1.1.aarch64",
"product": {
"name": "kernel-devel-6.19.8-1.1.aarch64",
"product_id": "kernel-devel-6.19.8-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.19.8-1.1.aarch64",
"product": {
"name": "kernel-macros-6.19.8-1.1.aarch64",
"product_id": "kernel-macros-6.19.8-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-source-6.19.8-1.1.aarch64",
"product": {
"name": "kernel-source-6.19.8-1.1.aarch64",
"product_id": "kernel-source-6.19.8-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.19.8-1.1.aarch64",
"product": {
"name": "kernel-source-vanilla-6.19.8-1.1.aarch64",
"product_id": "kernel-source-vanilla-6.19.8-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.19.8-1.1.ppc64le",
"product": {
"name": "kernel-devel-6.19.8-1.1.ppc64le",
"product_id": "kernel-devel-6.19.8-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.19.8-1.1.ppc64le",
"product": {
"name": "kernel-macros-6.19.8-1.1.ppc64le",
"product_id": "kernel-macros-6.19.8-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-source-6.19.8-1.1.ppc64le",
"product": {
"name": "kernel-source-6.19.8-1.1.ppc64le",
"product_id": "kernel-source-6.19.8-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.19.8-1.1.ppc64le",
"product": {
"name": "kernel-source-vanilla-6.19.8-1.1.ppc64le",
"product_id": "kernel-source-vanilla-6.19.8-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.19.8-1.1.s390x",
"product": {
"name": "kernel-devel-6.19.8-1.1.s390x",
"product_id": "kernel-devel-6.19.8-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.19.8-1.1.s390x",
"product": {
"name": "kernel-macros-6.19.8-1.1.s390x",
"product_id": "kernel-macros-6.19.8-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-6.19.8-1.1.s390x",
"product": {
"name": "kernel-source-6.19.8-1.1.s390x",
"product_id": "kernel-source-6.19.8-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.19.8-1.1.s390x",
"product": {
"name": "kernel-source-vanilla-6.19.8-1.1.s390x",
"product_id": "kernel-source-vanilla-6.19.8-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.19.8-1.1.x86_64",
"product": {
"name": "kernel-devel-6.19.8-1.1.x86_64",
"product_id": "kernel-devel-6.19.8-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.19.8-1.1.x86_64",
"product": {
"name": "kernel-macros-6.19.8-1.1.x86_64",
"product_id": "kernel-macros-6.19.8-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-6.19.8-1.1.x86_64",
"product": {
"name": "kernel-source-6.19.8-1.1.x86_64",
"product_id": "kernel-source-6.19.8-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.19.8-1.1.x86_64",
"product": {
"name": "kernel-source-vanilla-6.19.8-1.1.x86_64",
"product_id": "kernel-source-vanilla-6.19.8-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.19.8-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64"
},
"product_reference": "kernel-devel-6.19.8-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.19.8-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le"
},
"product_reference": "kernel-devel-6.19.8-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.19.8-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x"
},
"product_reference": "kernel-devel-6.19.8-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.19.8-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64"
},
"product_reference": "kernel-devel-6.19.8-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.19.8-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64"
},
"product_reference": "kernel-macros-6.19.8-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.19.8-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le"
},
"product_reference": "kernel-macros-6.19.8-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.19.8-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x"
},
"product_reference": "kernel-macros-6.19.8-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.19.8-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64"
},
"product_reference": "kernel-macros-6.19.8-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.19.8-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64"
},
"product_reference": "kernel-source-6.19.8-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.19.8-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le"
},
"product_reference": "kernel-source-6.19.8-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.19.8-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x"
},
"product_reference": "kernel-source-6.19.8-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.19.8-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64"
},
"product_reference": "kernel-source-6.19.8-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.19.8-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64"
},
"product_reference": "kernel-source-vanilla-6.19.8-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.19.8-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le"
},
"product_reference": "kernel-source-vanilla-6.19.8-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.19.8-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x"
},
"product_reference": "kernel-source-vanilla-6.19.8-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.19.8-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
},
"product_reference": "kernel-source-vanilla-6.19.8-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-71229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71229"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw88: Fix alignment fault in rtw_core_enable_beacon()\n\nrtw_core_enable_beacon() reads 4 bytes from an address that is not a\nmultiple of 4. This results in a crash on some systems.\n\nDo 1 byte reads/writes instead.\n\nUnable to handle kernel paging request at virtual address ffff8000827e0522\nMem abort info:\n ESR = 0x0000000096000021\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x21: alignment fault\nData abort info:\n ISV = 0, ISS = 0x00000021, ISS2 = 0x00000000\n CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\nswapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000005492000\n[ffff8000827e0522] pgd=0000000000000000, p4d=10000001021d9403, pud=10000001021da403, pmd=100000011061c403, pte=00780000f3200f13\nInternal error: Oops: 0000000096000021 [#1] SMP\nModules linked in: [...] rtw88_8822ce rtw88_8822c rtw88_pci rtw88_core [...]\nCPU: 0 UID: 0 PID: 73 Comm: kworker/u32:2 Tainted: G W 6.17.9 #1-NixOS VOLUNTARY\nTainted: [W]=WARN\nHardware name: FriendlyElec NanoPC-T6 LTS (DT)\nWorkqueue: phy0 rtw_c2h_work [rtw88_core]\npstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : rtw_pci_read32+0x18/0x40 [rtw88_pci]\nlr : rtw_core_enable_beacon+0xe0/0x148 [rtw88_core]\nsp : ffff800080cc3ca0\nx29: ffff800080cc3ca0 x28: ffff0001031fc240 x27: ffff000102100828\nx26: ffffd2cb7c9b4088 x25: ffff0001031fc2c0 x24: ffff000112fdef00\nx23: ffff000112fdef18 x22: ffff000111c29970 x21: 0000000000000001\nx20: 0000000000000001 x19: ffff000111c22040 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffd2cb6507c090\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\nx2 : 0000000000007f10 x1 : 0000000000000522 x0 : ffff8000827e0522\nCall trace:\n rtw_pci_read32+0x18/0x40 [rtw88_pci] (P)\n rtw_hw_scan_chan_switch+0x124/0x1a8 [rtw88_core]\n rtw_fw_c2h_cmd_handle+0x254/0x290 [rtw88_core]\n rtw_c2h_work+0x50/0x98 [rtw88_core]\n process_one_work+0x178/0x3f8\n worker_thread+0x208/0x418\n kthread+0x120/0x220\n ret_from_fork+0x10/0x20\nCode: d28fe202 8b020000 f9524400 8b214000 (b9400000)\n---[ end trace 0000000000000000 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71229",
"url": "https://www.suse.com/security/cve/CVE-2025-71229"
},
{
"category": "external",
"summary": "SUSE Bug 1258415 for CVE-2025-71229",
"url": "https://bugzilla.suse.com/1258415"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-71229"
},
{
"cve": "CVE-2025-71230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71230"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfs: ensure sb-\u003es_fs_info is always cleaned up\n\nWhen hfs was converted to the new mount api a bug was introduced by\nchanging the allocation pattern of sb-\u003es_fs_info. If setup_bdev_super()\nfails after a new superblock has been allocated by sget_fc(), but before\nhfs_fill_super() takes ownership of the filesystem-specific s_fs_info\ndata it was leaked.\n\nFix this by freeing sb-\u003es_fs_info in hfs_kill_super().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71230",
"url": "https://www.suse.com/security/cve/CVE-2025-71230"
},
{
"category": "external",
"summary": "SUSE Bug 1258413 for CVE-2025-71230",
"url": "https://bugzilla.suse.com/1258413"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-71230"
},
{
"cve": "CVE-2025-71231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71231"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode\n\nThe local variable \u0027i\u0027 is initialized with -EINVAL, but the for loop\nimmediately overwrites it and -EINVAL is never returned.\n\nIf no empty compression mode can be found, the function would return the\nout-of-bounds index IAA_COMP_MODES_MAX, which would cause an invalid\narray access in add_iaa_compression_mode().\n\nFix both issues by returning either a valid index or -EINVAL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71231",
"url": "https://www.suse.com/security/cve/CVE-2025-71231"
},
{
"category": "external",
"summary": "SUSE Bug 1258424 for CVE-2025-71231",
"url": "https://bugzilla.suse.com/1258424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-71231"
},
{
"cve": "CVE-2025-71232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71232"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Free sp in error path to fix system crash\n\nSystem crash seen during load/unload test in a loop,\n\n[61110.449331] qla2xxx [0000:27:00.0]-0042:0: Disabled MSI-X.\n[61110.467494] =============================================================================\n[61110.467498] BUG qla2xxx_srbs (Tainted: G OE -------- --- ): Objects remaining in qla2xxx_srbs on __kmem_cache_shutdown()\n[61110.467501] -----------------------------------------------------------------------------\n\n[61110.467502] Slab 0x000000000ffc8162 objects=51 used=1 fp=0x00000000e25d3d85 flags=0x57ffffc0010200(slab|head|node=1|zone=2|lastcpupid=0x1fffff)\n[61110.467509] CPU: 53 PID: 455206 Comm: rmmod Kdump: loaded Tainted: G OE -------- --- 5.14.0-284.11.1.el9_2.x86_64 #1\n[61110.467513] Hardware name: HPE ProLiant DL385 Gen10 Plus v2/ProLiant DL385 Gen10 Plus v2, BIOS A42 08/17/2023\n[61110.467515] Call Trace:\n[61110.467516] \u003cTASK\u003e\n[61110.467519] dump_stack_lvl+0x34/0x48\n[61110.467526] slab_err.cold+0x53/0x67\n[61110.467534] __kmem_cache_shutdown+0x16e/0x320\n[61110.467540] kmem_cache_destroy+0x51/0x160\n[61110.467544] qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467607] ? __do_sys_delete_module.constprop.0+0x178/0x280\n[61110.467613] ? syscall_trace_enter.constprop.0+0x145/0x1d0\n[61110.467616] ? do_syscall_64+0x5c/0x90\n[61110.467619] ? exc_page_fault+0x62/0x150\n[61110.467622] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[61110.467626] \u003c/TASK\u003e\n[61110.467627] Disabling lock debugging due to kernel taint\n[61110.467635] Object 0x0000000026f7e6e6 @offset=16000\n[61110.467639] ------------[ cut here ]------------\n[61110.467639] kmem_cache_destroy qla2xxx_srbs: Slab cache still has objects when called from qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467659] WARNING: CPU: 53 PID: 455206 at mm/slab_common.c:520 kmem_cache_destroy+0x14d/0x160\n[61110.467718] CPU: 53 PID: 455206 Comm: rmmod Kdump: loaded Tainted: G B OE -------- --- 5.14.0-284.11.1.el9_2.x86_64 #1\n[61110.467720] Hardware name: HPE ProLiant DL385 Gen10 Plus v2/ProLiant DL385 Gen10 Plus v2, BIOS A42 08/17/2023\n[61110.467721] RIP: 0010:kmem_cache_destroy+0x14d/0x160\n[61110.467724] Code: 99 7d 07 00 48 89 ef e8 e1 6a 07 00 eb b3 48 8b 55 60 48 8b 4c 24 20 48 c7 c6 70 fc 66 90 48 c7 c7 f8 ef a1 90 e8 e1 ed 7c 00 \u003c0f\u003e 0b eb 93 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 55 48 89\n[61110.467725] RSP: 0018:ffffa304e489fe80 EFLAGS: 00010282\n[61110.467727] RAX: 0000000000000000 RBX: ffffffffc0d9a860 RCX: 0000000000000027\n[61110.467729] RDX: ffff8fd5ff9598a8 RSI: 0000000000000001 RDI: ffff8fd5ff9598a0\n[61110.467730] RBP: ffff8fb6aaf78700 R08: 0000000000000000 R09: 0000000100d863b7\n[61110.467731] R10: ffffa304e489fd20 R11: ffffffff913bef48 R12: 0000000040002000\n[61110.467731] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[61110.467733] FS: 00007f64c89fb740(0000) GS:ffff8fd5ff940000(0000) knlGS:0000000000000000\n[61110.467734] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[61110.467735] CR2: 00007f0f02bfe000 CR3: 00000020ad6dc005 CR4: 0000000000770ee0\n[61110.467736] PKRU: 55555554\n[61110.467737] Call Trace:\n[61110.467738] \u003cTASK\u003e\n[61110.467739] qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467755] ? __do_sys_delete_module.constprop.0+0x178/0x280\n\nFree sp in the error path to fix the crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71232",
"url": "https://www.suse.com/security/cve/CVE-2025-71232"
},
{
"category": "external",
"summary": "SUSE Bug 1258422 for CVE-2025-71232",
"url": "https://bugzilla.suse.com/1258422"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-71232"
},
{
"cve": "CVE-2025-71233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71233"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: endpoint: Avoid creating sub-groups asynchronously\n\nThe asynchronous creation of sub-groups by a delayed work could lead to a\nNULL pointer dereference when the driver directory is removed before the\nwork completes.\n\nThe crash can be easily reproduced with the following commands:\n\n # cd /sys/kernel/config/pci_ep/functions/pci_epf_test\n # for i in {1..20}; do mkdir test \u0026\u0026 rmdir test; done\n\n BUG: kernel NULL pointer dereference, address: 0000000000000088\n ...\n Call Trace:\n configfs_register_group+0x3d/0x190\n pci_epf_cfs_work+0x41/0x110\n process_one_work+0x18f/0x350\n worker_thread+0x25a/0x3a0\n\nFix this issue by using configfs_add_default_group() API which does not\nhave the deadlock problem as configfs_register_group() and does not require\nthe delayed work handler.\n\n[mani: slightly reworded the description and added stable list]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71233",
"url": "https://www.suse.com/security/cve/CVE-2025-71233"
},
{
"category": "external",
"summary": "SUSE Bug 1258421 for CVE-2025-71233",
"url": "https://bugzilla.suse.com/1258421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-71233"
},
{
"cve": "CVE-2025-71234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71234"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add\n\nThe driver does not set hw-\u003esta_data_size, which causes mac80211 to\nallocate insufficient space for driver private station data in\n__sta_info_alloc(). When rtl8xxxu_sta_add() accesses members of\nstruct rtl8xxxu_sta_info through sta-\u003edrv_priv, this results in a\nslab-out-of-bounds write.\n\nKASAN report on RISC-V (VisionFive 2) with RTL8192EU adapter:\n\n BUG: KASAN: slab-out-of-bounds in rtl8xxxu_sta_add+0x31c/0x346\n Write of size 8 at addr ffffffd6d3e9ae88 by task kworker/u16:0/12\n\nSet hw-\u003esta_data_size to sizeof(struct rtl8xxxu_sta_info) during\nprobe, similar to how hw-\u003evif_data_size is configured. This ensures\nmac80211 allocates sufficient space for the driver\u0027s per-station\nprivate data.\n\nTested on StarFive VisionFive 2 v1.2A board.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71234",
"url": "https://www.suse.com/security/cve/CVE-2025-71234"
},
{
"category": "external",
"summary": "SUSE Bug 1258419 for CVE-2025-71234",
"url": "https://bugzilla.suse.com/1258419"
},
{
"category": "external",
"summary": "SUSE Bug 1258420 for CVE-2025-71234",
"url": "https://bugzilla.suse.com/1258420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-71234"
},
{
"cve": "CVE-2025-71235",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71235"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Delay module unload while fabric scan in progress\n\nSystem crash seen during load/unload test in a loop.\n\n[105954.384919] RBP: ffff914589838dc0 R08: 0000000000000000 R09: 0000000000000086\n[105954.384920] R10: 000000000000000f R11: ffffa31240904be5 R12: ffff914605f868e0\n[105954.384921] R13: ffff914605f86910 R14: 0000000000008010 R15: 00000000ddb7c000\n[105954.384923] FS: 0000000000000000(0000) GS:ffff9163fec40000(0000) knlGS:0000000000000000\n[105954.384925] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[105954.384926] CR2: 000055d31ce1d6a0 CR3: 0000000119f5e001 CR4: 0000000000770ee0\n[105954.384928] PKRU: 55555554\n[105954.384929] Call Trace:\n[105954.384931] \u003cIRQ\u003e\n[105954.384934] qla24xx_sp_unmap+0x1f3/0x2a0 [qla2xxx]\n[105954.384962] ? qla_async_scan_sp_done+0x114/0x1f0 [qla2xxx]\n[105954.384980] ? qla24xx_els_ct_entry+0x4de/0x760 [qla2xxx]\n[105954.384999] ? __wake_up_common+0x80/0x190\n[105954.385004] ? qla24xx_process_response_queue+0xc2/0xaa0 [qla2xxx]\n[105954.385023] ? qla24xx_msix_rsp_q+0x44/0xb0 [qla2xxx]\n[105954.385040] ? __handle_irq_event_percpu+0x3d/0x190\n[105954.385044] ? handle_irq_event+0x58/0xb0\n[105954.385046] ? handle_edge_irq+0x93/0x240\n[105954.385050] ? __common_interrupt+0x41/0xa0\n[105954.385055] ? common_interrupt+0x3e/0xa0\n[105954.385060] ? asm_common_interrupt+0x22/0x40\n\nThe root cause of this was that there was a free (dma_free_attrs) in the\ninterrupt context. There was a device discovery/fabric scan in\nprogress. A module unload was issued which set the UNLOADING flag. As\npart of the discovery, after receiving an interrupt a work queue was\nscheduled (which involved a work to be queued). Since the UNLOADING\nflag is set, the work item was not allocated and the mapped memory had\nto be freed. The free occurred in interrupt context leading to system\ncrash. Delay the driver unload until the fabric scan is complete to\navoid the crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71235",
"url": "https://www.suse.com/security/cve/CVE-2025-71235"
},
{
"category": "external",
"summary": "SUSE Bug 1258469 for CVE-2025-71235",
"url": "https://bugzilla.suse.com/1258469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-71235"
},
{
"cve": "CVE-2025-71236",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71236"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Validate sp before freeing associated memory\n\nSystem crash with the following signature\n[154563.214890] nvme nvme2: NVME-FC{1}: controller connect complete\n[154564.169363] qla2xxx [0000:b0:00.1]-3002:2: nvme: Sched: Set ZIO exchange threshold to 3.\n[154564.169405] qla2xxx [0000:b0:00.1]-ffffff:2: SET ZIO Activity exchange threshold to 5.\n[154565.539974] qla2xxx [0000:b0:00.1]-5013:2: RSCN database changed - 0078 0080 0000.\n[154565.545744] qla2xxx [0000:b0:00.1]-5013:2: RSCN database changed - 0078 00a0 0000.\n[154565.545857] qla2xxx [0000:b0:00.1]-11a2:2: FEC=enabled (data rate).\n[154565.552760] qla2xxx [0000:b0:00.1]-11a2:2: FEC=enabled (data rate).\n[154565.553079] BUG: kernel NULL pointer dereference, address: 00000000000000f8\n[154565.553080] #PF: supervisor read access in kernel mode\n[154565.553082] #PF: error_code(0x0000) - not-present page\n[154565.553084] PGD 80000010488ab067 P4D 80000010488ab067 PUD 104978a067 PMD 0\n[154565.553089] Oops: 0000 1 PREEMPT SMP PTI\n[154565.553092] CPU: 10 PID: 858 Comm: qla2xxx_2_dpc Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.11.1.el9_5.x86_64 #1\n[154565.553096] Hardware name: HPE Synergy 660 Gen10/Synergy 660 Gen10 Compute Module, BIOS I43 09/30/2024\n[154565.553097] RIP: 0010:qla_fab_async_scan.part.0+0x40b/0x870 [qla2xxx]\n[154565.553141] Code: 00 00 e8 58 a3 ec d4 49 89 e9 ba 12 20 00 00 4c 89 e6 49 c7 c0 00 ee a8 c0 48 c7 c1 66 c0 a9 c0 bf 00 80 00 10 e8 15 69 00 00 \u003c4c\u003e 8b 8d f8 00 00 00 4d 85 c9 74 35 49 8b 84 24 00 19 00 00 48 8b\n[154565.553143] RSP: 0018:ffffb4dbc8aebdd0 EFLAGS: 00010286\n[154565.553145] RAX: 0000000000000000 RBX: ffff8ec2cf0908d0 RCX: 0000000000000002\n[154565.553147] RDX: 0000000000000000 RSI: ffffffffc0a9c896 RDI: ffffb4dbc8aebd47\n[154565.553148] RBP: 0000000000000000 R08: ffffb4dbc8aebd45 R09: 0000000000ffff0a\n[154565.553150] R10: 0000000000000000 R11: 000000000000000f R12: ffff8ec2cf0908d0\n[154565.553151] R13: ffff8ec2cf090900 R14: 0000000000000102 R15: ffff8ec2cf084000\n[154565.553152] FS: 0000000000000000(0000) GS:ffff8ed27f800000(0000) knlGS:0000000000000000\n[154565.553154] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[154565.553155] CR2: 00000000000000f8 CR3: 000000113ae0a005 CR4: 00000000007706f0\n[154565.553157] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[154565.553158] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[154565.553159] PKRU: 55555554\n[154565.553160] Call Trace:\n[154565.553162] \u003cTASK\u003e\n[154565.553165] ? show_trace_log_lvl+0x1c4/0x2df\n[154565.553172] ? show_trace_log_lvl+0x1c4/0x2df\n[154565.553177] ? qla_fab_async_scan.part.0+0x40b/0x870 [qla2xxx]\n[154565.553215] ? __die_body.cold+0x8/0xd\n[154565.553218] ? page_fault_oops+0x134/0x170\n[154565.553223] ? snprintf+0x49/0x70\n[154565.553229] ? exc_page_fault+0x62/0x150\n[154565.553238] ? asm_exc_page_fault+0x22/0x30\n\nCheck for sp being non NULL before freeing any associated memory",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71236",
"url": "https://www.suse.com/security/cve/CVE-2025-71236"
},
{
"category": "external",
"summary": "SUSE Bug 1258442 for CVE-2025-71236",
"url": "https://bugzilla.suse.com/1258442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-71236"
},
{
"cve": "CVE-2025-71237",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71237"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: Fix potential block overflow that cause system hang\n\nWhen a user executes the FITRIM command, an underflow can occur when\ncalculating nblocks if end_block is too small. Since nblocks is of\ntype sector_t, which is u64, a negative nblocks value will become a\nvery large positive integer. This ultimately leads to the block layer\nfunction __blkdev_issue_discard() taking an excessively long time to\nprocess the bio chain, and the ns_segctor_sem lock remains held for a\nlong period. This prevents other tasks from acquiring the ns_segctor_sem\nlock, resulting in the hang reported by syzbot in [1].\n\nIf the ending block is too small, typically if it is smaller than 4KiB\nrange, depending on the usage of the segment 0, it may be possible to\nattempt a discard request beyond the device size causing the hang.\n\nExiting successfully and assign the discarded size (0 in this case)\nto range-\u003elen.\n\nAlthough the start and len values in the user input range are too small,\na conservative strategy is adopted here to safely ignore them, which is\nequivalent to a no-op; it will not perform any trimming and will not\nthrow an error.\n\n[1]\ntask:segctord state:D stack:28968 pid:6093 tgid:6093 ppid:2 task_flags:0x200040 flags:0x00080000\nCall Trace:\n rwbase_write_lock+0x3dd/0x750 kernel/locking/rwbase_rt.c:272\n nilfs_transaction_lock+0x253/0x4c0 fs/nilfs2/segment.c:357\n nilfs_segctor_thread_construct fs/nilfs2/segment.c:2569 [inline]\n nilfs_segctor_thread+0x6ec/0xe00 fs/nilfs2/segment.c:2684\n\n[ryusuke: corrected part of the commit message about the consequences]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71237",
"url": "https://www.suse.com/security/cve/CVE-2025-71237"
},
{
"category": "external",
"summary": "SUSE Bug 1258467 for CVE-2025-71237",
"url": "https://bugzilla.suse.com/1258467"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-71237"
},
{
"cve": "CVE-2025-71238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71238"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix bsg_done() causing double free\n\nKernel panic observed on system,\n\n[5353358.825191] BUG: unable to handle page fault for address: ff5f5e897b024000\n[5353358.825194] #PF: supervisor write access in kernel mode\n[5353358.825195] #PF: error_code(0x0002) - not-present page\n[5353358.825196] PGD 100006067 P4D 0\n[5353358.825198] Oops: 0002 [#1] PREEMPT SMP NOPTI\n[5353358.825200] CPU: 5 PID: 2132085 Comm: qlafwupdate.sub Kdump: loaded Tainted: G W L ------- --- 5.14.0-503.34.1.el9_5.x86_64 #1\n[5353358.825203] Hardware name: HPE ProLiant DL360 Gen11/ProLiant DL360 Gen11, BIOS 2.44 01/17/2025\n[5353358.825204] RIP: 0010:memcpy_erms+0x6/0x10\n[5353358.825211] RSP: 0018:ff591da8f4f6b710 EFLAGS: 00010246\n[5353358.825212] RAX: ff5f5e897b024000 RBX: 0000000000007090 RCX: 0000000000001000\n[5353358.825213] RDX: 0000000000001000 RSI: ff591da8f4fed090 RDI: ff5f5e897b024000\n[5353358.825214] RBP: 0000000000010000 R08: ff5f5e897b024000 R09: 0000000000000000\n[5353358.825215] R10: ff46cf8c40517000 R11: 0000000000000001 R12: 0000000000008090\n[5353358.825216] R13: ff591da8f4f6b720 R14: 0000000000001000 R15: 0000000000000000\n[5353358.825218] FS: 00007f1e88d47740(0000) GS:ff46cf935f940000(0000) knlGS:0000000000000000\n[5353358.825219] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[5353358.825220] CR2: ff5f5e897b024000 CR3: 0000000231532004 CR4: 0000000000771ef0\n[5353358.825221] PKRU: 55555554\n[5353358.825222] Call Trace:\n[5353358.825223] \u003cTASK\u003e\n[5353358.825224] ? show_trace_log_lvl+0x1c4/0x2df\n[5353358.825229] ? show_trace_log_lvl+0x1c4/0x2df\n[5353358.825232] ? sg_copy_buffer+0xc8/0x110\n[5353358.825236] ? __die_body.cold+0x8/0xd\n[5353358.825238] ? page_fault_oops+0x134/0x170\n[5353358.825242] ? kernelmode_fixup_or_oops+0x84/0x110\n[5353358.825244] ? exc_page_fault+0xa8/0x150\n[5353358.825247] ? asm_exc_page_fault+0x22/0x30\n[5353358.825252] ? memcpy_erms+0x6/0x10\n[5353358.825253] sg_copy_buffer+0xc8/0x110\n[5353358.825259] qla2x00_process_vendor_specific+0x652/0x1320 [qla2xxx]\n[5353358.825317] qla24xx_bsg_request+0x1b2/0x2d0 [qla2xxx]\n\nMost routines in qla_bsg.c call bsg_done() only for success cases.\nHowever a few invoke it for failure case as well leading to a double\nfree. Validate before calling bsg_done().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71238",
"url": "https://www.suse.com/security/cve/CVE-2025-71238"
},
{
"category": "external",
"summary": "SUSE Bug 1259186 for CVE-2025-71238",
"url": "https://bugzilla.suse.com/1259186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-71238"
},
{
"cve": "CVE-2026-23220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23220"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix infinite loop caused by next_smb2_rcv_hdr_off reset in error paths\n\nThe problem occurs when a signed request fails smb2 signature verification\ncheck. In __process_request(), if check_sign_req() returns an error,\nset_smb2_rsp_status(work, STATUS_ACCESS_DENIED) is called.\nset_smb2_rsp_status() set work-\u003enext_smb2_rcv_hdr_off as zero. By resetting\nnext_smb2_rcv_hdr_off to zero, the pointer to the next command in the chain\nis lost. Consequently, is_chained_smb2_message() continues to point to\nthe same request header instead of advancing. If the header\u0027s NextCommand\nfield is non-zero, the function returns true, causing __handle_ksmbd_work()\nto repeatedly process the same failed request in an infinite loop.\nThis results in the kernel log being flooded with \"bad smb2 signature\"\nmessages and high CPU usage.\n\nThis patch fixes the issue by changing the return value from\nSERVER_HANDLER_CONTINUE to SERVER_HANDLER_ABORT. This ensures that\nthe processing loop terminates immediately rather than attempting to\ncontinue from an invalidated offset.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23220",
"url": "https://www.suse.com/security/cve/CVE-2026-23220"
},
{
"category": "external",
"summary": "SUSE Bug 1258432 for CVE-2026-23220",
"url": "https://bugzilla.suse.com/1258432"
},
{
"category": "external",
"summary": "SUSE Bug 1258433 for CVE-2026-23220",
"url": "https://bugzilla.suse.com/1258433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-23220"
},
{
"cve": "CVE-2026-23221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23221"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: fsl-mc: fix use-after-free in driver_override_show()\n\nThe driver_override_show() function reads the driver_override string\nwithout holding the device_lock. However, driver_override_store() uses\ndriver_set_override(), which modifies and frees the string while holding\nthe device_lock.\n\nThis can result in a concurrent use-after-free if the string is freed\nby the store function while being read by the show function.\n\nFix this by holding the device_lock around the read operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23221",
"url": "https://www.suse.com/security/cve/CVE-2026-23221"
},
{
"category": "external",
"summary": "SUSE Bug 1258660 for CVE-2026-23221",
"url": "https://bugzilla.suse.com/1258660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23221"
},
{
"cve": "CVE-2026-23222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23222"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly\n\nThe existing allocation of scatterlists in omap_crypto_copy_sg_lists()\nwas allocating an array of scatterlist pointers, not scatterlist objects,\nresulting in a 4x too small allocation.\n\nUse sizeof(*new_sg) to get the correct object size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23222",
"url": "https://www.suse.com/security/cve/CVE-2026-23222"
},
{
"category": "external",
"summary": "SUSE Bug 1258484 for CVE-2026-23222",
"url": "https://bugzilla.suse.com/1258484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23222"
},
{
"cve": "CVE-2026-23223",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23223"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: fix UAF in xchk_btree_check_block_owner\n\nWe cannot dereference bs-\u003ecur when trying to determine if bs-\u003ecur\naliases bs-\u003esc-\u003esa.{bno,rmap}_cur after the latter has been freed.\nFix this by sampling before type before any freeing could happen.\nThe correct temporal ordering was broken when we removed xfs_btnum_t.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23223",
"url": "https://www.suse.com/security/cve/CVE-2026-23223"
},
{
"category": "external",
"summary": "SUSE Bug 1258483 for CVE-2026-23223",
"url": "https://bugzilla.suse.com/1258483"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23223"
},
{
"cve": "CVE-2026-23224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23224"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nerofs: fix UAF issue for file-backed mounts w/ directio option\n\n[ 9.269940][ T3222] Call trace:\n[ 9.269948][ T3222] ext4_file_read_iter+0xac/0x108\n[ 9.269979][ T3222] vfs_iocb_iter_read+0xac/0x198\n[ 9.269993][ T3222] erofs_fileio_rq_submit+0x12c/0x180\n[ 9.270008][ T3222] erofs_fileio_submit_bio+0x14/0x24\n[ 9.270030][ T3222] z_erofs_runqueue+0x834/0x8ac\n[ 9.270054][ T3222] z_erofs_read_folio+0x120/0x220\n[ 9.270083][ T3222] filemap_read_folio+0x60/0x120\n[ 9.270102][ T3222] filemap_fault+0xcac/0x1060\n[ 9.270119][ T3222] do_pte_missing+0x2d8/0x1554\n[ 9.270131][ T3222] handle_mm_fault+0x5ec/0x70c\n[ 9.270142][ T3222] do_page_fault+0x178/0x88c\n[ 9.270167][ T3222] do_translation_fault+0x38/0x54\n[ 9.270183][ T3222] do_mem_abort+0x54/0xac\n[ 9.270208][ T3222] el0_da+0x44/0x7c\n[ 9.270227][ T3222] el0t_64_sync_handler+0x5c/0xf4\n[ 9.270253][ T3222] el0t_64_sync+0x1bc/0x1c0\n\nEROFS may encounter above panic when enabling file-backed mount w/\ndirectio mount option, the root cause is it may suffer UAF in below\nrace condition:\n\n- z_erofs_read_folio wq s_dio_done_wq\n - z_erofs_runqueue\n - erofs_fileio_submit_bio\n - erofs_fileio_rq_submit\n - vfs_iocb_iter_read\n - ext4_file_read_iter\n - ext4_dio_read_iter\n - iomap_dio_rw\n : bio was submitted and return -EIOCBQUEUED\n - dio_aio_complete_work\n - dio_complete\n - dio-\u003eiocb-\u003eki_complete (erofs_fileio_ki_complete())\n - kfree(rq)\n : it frees iocb, iocb.ki_filp can be UAF in file_accessed().\n - file_accessed\n : access NULL file point\n\nIntroduce a reference count in struct erofs_fileio_rq, and initialize it\nas two, both erofs_fileio_ki_complete() and erofs_fileio_rq_submit() will\ndecrease reference count, the last one decreasing the reference count\nto zero will free rq.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23224",
"url": "https://www.suse.com/security/cve/CVE-2026-23224"
},
{
"category": "external",
"summary": "SUSE Bug 1258461 for CVE-2026-23224",
"url": "https://bugzilla.suse.com/1258461"
},
{
"category": "external",
"summary": "SUSE Bug 1258463 for CVE-2026-23224",
"url": "https://bugzilla.suse.com/1258463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-23224"
},
{
"cve": "CVE-2026-23225",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23225"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/mmcid: Don\u0027t assume CID is CPU owned on mode switch\n\nShinichiro reported a KASAN UAF, which is actually an out of bounds access\nin the MMCID management code.\n\n CPU0\t\t\t\t\t\tCPU1\n \t\t\t\t\t\tT1 runs in userspace\n T0: fork(T4) -\u003e Switch to per CPU CID mode\n fixup() set MM_CID_TRANSIT on T1/CPU1\n T4 exit()\n T3 exit()\n T2 exit()\n\t\t\t\t\t\tT1 exit() switch to per task mode\n\t\t\t\t\t\t ---\u003e Out of bounds access.\n\nAs T1 has not scheduled after T0 set the TRANSIT bit, it exits with the\nTRANSIT bit set. sched_mm_cid_remove_user() clears the TRANSIT bit in\nthe task and drops the CID, but it does not touch the per CPU storage.\nThat\u0027s functionally correct because a CID is only owned by the CPU when\nthe ONCPU bit is set, which is mutually exclusive with the TRANSIT flag.\n\nNow sched_mm_cid_exit() assumes that the CID is CPU owned because the\nprior mode was per CPU. It invokes mm_drop_cid_on_cpu() which clears the\nnot set ONCPU bit and then invokes clear_bit() with an insanely large\nbit number because TRANSIT is set (bit 29).\n\nPrevent that by actually validating that the CID is CPU owned in\nmm_drop_cid_on_cpu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23225",
"url": "https://www.suse.com/security/cve/CVE-2026-23225"
},
{
"category": "external",
"summary": "SUSE Bug 1258474 for CVE-2026-23225",
"url": "https://bugzilla.suse.com/1258474"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23225"
},
{
"cve": "CVE-2026-23226",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23226"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: add chann_lock to protect ksmbd_chann_list xarray\n\nksmbd_chann_list xarray lacks synchronization, allowing use-after-free in\nmulti-channel sessions (between lookup_chann_list() and ksmbd_chann_del).\n\nAdds rw_semaphore chann_lock to struct ksmbd_session and protects\nall xa_load/xa_store/xa_erase accesses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23226",
"url": "https://www.suse.com/security/cve/CVE-2026-23226"
},
{
"category": "external",
"summary": "SUSE Bug 1258820 for CVE-2026-23226",
"url": "https://bugzilla.suse.com/1258820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23226"
},
{
"cve": "CVE-2026-23227",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23227"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/exynos: vidi: use ctx-\u003elock to protect struct vidi_context member variables related to memory alloc/free\n\nExynos Virtual Display driver performs memory alloc/free operations\nwithout lock protection, which easily causes concurrency problem.\n\nFor example, use-after-free can occur in race scenario like this:\n```\n\tCPU0\t\t\t\tCPU1\t\t\t\tCPU2\n\t----\t\t\t\t----\t\t\t\t----\n vidi_connection_ioctl()\n if (vidi-\u003econnection) // true\n drm_edid = drm_edid_alloc(); // alloc drm_edid\n ...\n ctx-\u003eraw_edid = drm_edid;\n ...\n\t\t\t\t\t\t\t\tdrm_mode_getconnector()\n\t\t\t\t\t\t\t\t drm_helper_probe_single_connector_modes()\n\t\t\t\t\t\t\t\t vidi_get_modes()\n\t\t\t\t\t\t\t\t if (ctx-\u003eraw_edid) // true\n\t\t\t\t\t\t\t\t drm_edid_dup(ctx-\u003eraw_edid);\n\t\t\t\t\t\t\t\t if (!drm_edid) // false\n\t\t\t\t\t\t\t\t ...\n\t\t\t\tvidi_connection_ioctl()\n\t\t\t\t if (vidi-\u003econnection) // false\n\t\t\t\t drm_edid_free(ctx-\u003eraw_edid); // free drm_edid\n\t\t\t\t ...\n\t\t\t\t\t\t\t\t drm_edid_alloc(drm_edid-\u003eedid)\n\t\t\t\t\t\t\t\t kmemdup(edid); // UAF!!\n\t\t\t\t\t\t\t\t ...\n```\n\nTo prevent these vulns, at least in vidi_context, member variables related\nto memory alloc/free should be protected with ctx-\u003elock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23227",
"url": "https://www.suse.com/security/cve/CVE-2026-23227"
},
{
"category": "external",
"summary": "SUSE Bug 1258472 for CVE-2026-23227",
"url": "https://bugzilla.suse.com/1258472"
},
{
"category": "external",
"summary": "SUSE Bug 1258473 for CVE-2026-23227",
"url": "https://bugzilla.suse.com/1258473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-23227"
},
{
"cve": "CVE-2026-23228",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23228"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection()\n\nOn kthread_run() failure in ksmbd_tcp_new_connection(), the transport is\nfreed via free_transport(), which does not decrement active_num_conn,\nleaking this counter.\n\nReplace free_transport() with ksmbd_tcp_disconnect().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23228",
"url": "https://www.suse.com/security/cve/CVE-2026-23228"
},
{
"category": "external",
"summary": "SUSE Bug 1258431 for CVE-2026-23228",
"url": "https://bugzilla.suse.com/1258431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23228"
},
{
"cve": "CVE-2026-23229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23229"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: virtio - Add spinlock protection with virtqueue notification\n\nWhen VM boots with one virtio-crypto PCI device and builtin backend,\nrun openssl benchmark command with multiple processes, such as\n openssl speed -evp aes-128-cbc -engine afalg -seconds 10 -multi 32\n\nopenssl processes will hangup and there is error reported like this:\n virtio_crypto virtio0: dataq.0:id 3 is not a head!\n\nIt seems that the data virtqueue need protection when it is handled\nfor virtio done notification. If the spinlock protection is added\nin virtcrypto_done_task(), openssl benchmark with multiple processes\nworks well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23229",
"url": "https://www.suse.com/security/cve/CVE-2026-23229"
},
{
"category": "external",
"summary": "SUSE Bug 1258429 for CVE-2026-23229",
"url": "https://bugzilla.suse.com/1258429"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23229"
},
{
"cve": "CVE-2026-23230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23230"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: split cached_fid bitfields to avoid shared-byte RMW races\n\nis_open, has_lease and on_list are stored in the same bitfield byte in\nstruct cached_fid but are updated in different code paths that may run\nconcurrently. Bitfield assignments generate byte read-modify-write\noperations (e.g. `orb $mask, addr` on x86_64), so updating one flag can\nrestore stale values of the others.\n\nA possible interleaving is:\n CPU1: load old byte (has_lease=1, on_list=1)\n CPU2: clear both flags (store 0)\n CPU1: RMW store (old | IS_OPEN) -\u003e reintroduces cleared bits\n\nTo avoid this class of races, convert these flags to separate bool\nfields.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23230",
"url": "https://www.suse.com/security/cve/CVE-2026-23230"
},
{
"category": "external",
"summary": "SUSE Bug 1258430 for CVE-2026-23230",
"url": "https://bugzilla.suse.com/1258430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23230"
},
{
"cve": "CVE-2026-23231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23231"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fix use-after-free in nf_tables_addchain()\n\nnf_tables_addchain() publishes the chain to table-\u003echains via\nlist_add_tail_rcu() (in nft_chain_add()) before registering hooks.\nIf nf_tables_register_hook() then fails, the error path calls\nnft_chain_del() (list_del_rcu()) followed by nf_tables_chain_destroy()\nwith no RCU grace period in between.\n\nThis creates two use-after-free conditions:\n\n 1) Control-plane: nf_tables_dump_chains() traverses table-\u003echains\n under rcu_read_lock(). A concurrent dump can still be walking\n the chain when the error path frees it.\n\n 2) Packet path: for NFPROTO_INET, nf_register_net_hook() briefly\n installs the IPv4 hook before IPv6 registration fails. Packets\n entering nft_do_chain() via the transient IPv4 hook can still be\n dereferencing chain-\u003eblob_gen_X when the error path frees the\n chain.\n\nAdd synchronize_rcu() between nft_chain_del() and the chain destroy\nso that all RCU readers -- both dump threads and in-flight packet\nevaluation -- have finished before the chain is freed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23231",
"url": "https://www.suse.com/security/cve/CVE-2026-23231"
},
{
"category": "external",
"summary": "SUSE Bug 1259188 for CVE-2026-23231",
"url": "https://bugzilla.suse.com/1259188"
},
{
"category": "external",
"summary": "SUSE Bug 1259189 for CVE-2026-23231",
"url": "https://bugzilla.suse.com/1259189"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-23231"
},
{
"cve": "CVE-2026-23232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23232"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"f2fs: block cache/dio write during f2fs_enable_checkpoint()\"\n\nThis reverts commit 196c81fdd438f7ac429d5639090a9816abb9760a.\n\nOriginal patch may cause below deadlock, revert it.\n\nwrite\t\t\t\tremount\n- write_begin\n - lock_page --- lock A\n - prepare_write_begin\n - f2fs_map_lock\n\t\t\t\t- f2fs_enable_checkpoint\n\t\t\t\t - down_write(cp_enable_rwsem) --- lock B\n\t\t\t\t - sync_inode_sb\n\t\t\t\t - writepages\n\t\t\t\t - lock_page\t\t\t--- lock A\n - down_read(cp_enable_rwsem) --- lock A",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23232",
"url": "https://www.suse.com/security/cve/CVE-2026-23232"
},
{
"category": "external",
"summary": "SUSE Bug 1259192 for CVE-2026-23232",
"url": "https://bugzilla.suse.com/1259192"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23232"
},
{
"cve": "CVE-2026-23233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23233"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid mapping wrong physical block for swapfile\n\nXiaolong Guo reported a f2fs bug in bugzilla [1]\n\n[1] https://bugzilla.kernel.org/show_bug.cgi?id=220951\n\nQuoted:\n\n\"When using stress-ng\u0027s swap stress test on F2FS filesystem with kernel 6.6+,\nthe system experiences data corruption leading to either:\n1 dm-verity corruption errors and device reboot\n2 F2FS node corruption errors and boot hangs\n\nThe issue occurs specifically when:\n1 Using F2FS filesystem (ext4 is unaffected)\n2 Swapfile size is less than F2FS section size (2MB)\n3 Swapfile has fragmented physical layout (multiple non-contiguous extents)\n4 Kernel version is 6.6+ (6.1 is unaffected)\n\nThe root cause is in check_swap_activate() function in fs/f2fs/data.c. When the\nfirst extent of a small swapfile (\u003c 2MB) is not aligned to section boundaries,\nthe function incorrectly treats it as the last extent, failing to map\nsubsequent extents. This results in incorrect swap_extent creation where only\nthe first extent is mapped, causing subsequent swap writes to overwrite wrong\nphysical locations (other files\u0027 data).\n\nSteps to Reproduce\n1 Setup a device with F2FS-formatted userdata partition\n2 Compile stress-ng from https://github.com/ColinIanKing/stress-ng\n3 Run swap stress test: (Android devices)\nadb shell \"cd /data/stressng; ./stress-ng-64 --metrics-brief --timeout 60\n--swap 0\"\n\nLog:\n1 Ftrace shows in kernel 6.6, only first extent is mapped during second\nf2fs_map_blocks call in check_swap_activate():\nstress-ng-swap-8990: f2fs_map_blocks: ino=11002, file offset=0, start\nblkaddr=0x43143, len=0x1\n(Only 4KB mapped, not the full swapfile)\n2 in kernel 6.1, both extents are correctly mapped:\nstress-ng-swap-5966: f2fs_map_blocks: ino=28011, file offset=0, start\nblkaddr=0x13cd4, len=0x1\nstress-ng-swap-5966: f2fs_map_blocks: ino=28011, file offset=1, start\nblkaddr=0x60c84b, len=0xff\n\nThe problematic code is in check_swap_activate():\nif ((pblock - SM_I(sbi)-\u003emain_blkaddr) % blks_per_sec ||\n nr_pblocks % blks_per_sec ||\n !f2fs_valid_pinned_area(sbi, pblock)) {\n bool last_extent = false;\n\n not_aligned++;\n\n nr_pblocks = roundup(nr_pblocks, blks_per_sec);\n if (cur_lblock + nr_pblocks \u003e sis-\u003emax)\n nr_pblocks -= blks_per_sec;\n\n /* this extent is last one */\n if (!nr_pblocks) {\n nr_pblocks = last_lblock - cur_lblock;\n last_extent = true;\n }\n\n ret = f2fs_migrate_blocks(inode, cur_lblock, nr_pblocks);\n if (ret) {\n if (ret == -ENOENT)\n ret = -EINVAL;\n goto out;\n }\n\n if (!last_extent)\n goto retry;\n}\n\nWhen the first extent is unaligned and roundup(nr_pblocks, blks_per_sec)\nexceeds sis-\u003emax, we subtract blks_per_sec resulting in nr_pblocks = 0. The\ncode then incorrectly assumes this is the last extent, sets nr_pblocks =\nlast_lblock - cur_lblock (entire swapfile), and performs migration. After\nmigration, it doesn\u0027t retry mapping, so subsequent extents are never processed.\n\"\n\nIn order to fix this issue, we need to lookup block mapping info after\nwe migrate all blocks in the tail of swapfile.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23233",
"url": "https://www.suse.com/security/cve/CVE-2026-23233"
},
{
"category": "external",
"summary": "SUSE Bug 1259193 for CVE-2026-23233",
"url": "https://bugzilla.suse.com/1259193"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-23233"
},
{
"cve": "CVE-2026-23234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23234"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid UAF in f2fs_write_end_io()\n\nAs syzbot reported an use-after-free issue in f2fs_write_end_io().\n\nIt is caused by below race condition:\n\nloop device\t\t\t\tumount\n- worker_thread\n - loop_process_work\n - do_req_filebacked\n - lo_rw_aio\n - lo_rw_aio_complete\n - blk_mq_end_request\n - blk_update_request\n - f2fs_write_end_io\n - dec_page_count\n - folio_end_writeback\n\t\t\t\t\t- kill_f2fs_super\n\t\t\t\t\t - kill_block_super\n\t\t\t\t\t - f2fs_put_super\n\t\t\t\t\t : free(sbi)\n : get_pages(, F2FS_WB_CP_DATA)\n accessed sbi which is freed\n\nIn kill_f2fs_super(), we will drop all page caches of f2fs inodes before\ncall free(sbi), it guarantee that all folios should end its writeback, so\nit should be safe to access sbi before last folio_end_writeback().\n\nLet\u0027s relocate ckpt thread wakeup flow before folio_end_writeback() to\nresolve this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23234",
"url": "https://www.suse.com/security/cve/CVE-2026-23234"
},
{
"category": "external",
"summary": "SUSE Bug 1259194 for CVE-2026-23234",
"url": "https://bugzilla.suse.com/1259194"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-23234"
},
{
"cve": "CVE-2026-23235",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23235"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix out-of-bounds access in sysfs attribute read/write\n\nSome f2fs sysfs attributes suffer from out-of-bounds memory access and\nincorrect handling of integer values whose size is not 4 bytes.\n\nFor example:\nvm:~# echo 65537 \u003e /sys/fs/f2fs/vde/carve_out\nvm:~# cat /sys/fs/f2fs/vde/carve_out\n65537\nvm:~# echo 4294967297 \u003e /sys/fs/f2fs/vde/atgc_age_threshold\nvm:~# cat /sys/fs/f2fs/vde/atgc_age_threshold\n1\n\ncarve_out maps to {struct f2fs_sb_info}-\u003ecarve_out, which is a 8-bit\ninteger. However, the sysfs interface allows setting it to a value\nlarger than 255, resulting in an out-of-range update.\n\natgc_age_threshold maps to {struct atgc_management}-\u003eage_threshold,\nwhich is a 64-bit integer, but its sysfs interface cannot correctly set\nvalues larger than UINT_MAX.\n\nThe root causes are:\n1. __sbi_store() treats all default values as unsigned int, which\nprevents updating integers larger than 4 bytes and causes out-of-bounds\nwrites for integers smaller than 4 bytes.\n\n2. f2fs_sbi_show() also assumes all default values are unsigned int,\nleading to out-of-bounds reads and incorrect access to integers larger\nthan 4 bytes.\n\nThis patch introduces {struct f2fs_attr}-\u003esize to record the actual size\nof the integer associated with each sysfs attribute. With this\ninformation, sysfs read and write operations can correctly access and\nupdate values according to their real data size, avoiding memory\ncorruption and truncation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23235",
"url": "https://www.suse.com/security/cve/CVE-2026-23235"
},
{
"category": "external",
"summary": "SUSE Bug 1259195 for CVE-2026-23235",
"url": "https://bugzilla.suse.com/1259195"
},
{
"category": "external",
"summary": "SUSE Bug 1259198 for CVE-2026-23235",
"url": "https://bugzilla.suse.com/1259198"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-23235"
},
{
"cve": "CVE-2026-23236",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23236"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: smscufx: properly copy ioctl memory to kernelspace\n\nThe UFX_IOCTL_REPORT_DAMAGE ioctl does not properly copy data from\nuserspace to kernelspace, and instead directly references the memory,\nwhich can cause problems if invalid data is passed from userspace. Fix\nthis all up by correctly copying the memory before accessing it within\nthe kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23236",
"url": "https://www.suse.com/security/cve/CVE-2026-23236"
},
{
"category": "external",
"summary": "SUSE Bug 1259199 for CVE-2026-23236",
"url": "https://bugzilla.suse.com/1259199"
},
{
"category": "external",
"summary": "SUSE Bug 1259200 for CVE-2026-23236",
"url": "https://bugzilla.suse.com/1259200"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-23236"
},
{
"cve": "CVE-2026-23239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23239"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nespintcp: Fix race condition in espintcp_close()\n\nThis issue was discovered during a code audit.\n\nAfter cancel_work_sync() is called from espintcp_close(),\nespintcp_tx_work() can still be scheduled from paths such as\nthe Delayed ACK handler or ksoftirqd.\nAs a result, the espintcp_tx_work() worker may dereference a\nfreed espintcp ctx or sk.\n\nThe following is a simple race scenario:\n\n cpu0 cpu1\n\n espintcp_close()\n cancel_work_sync(\u0026ctx-\u003ework);\n espintcp_write_space()\n schedule_work(\u0026ctx-\u003ework);\n\nTo prevent this race condition, cancel_work_sync() is\nreplaced with disable_work_sync().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23239",
"url": "https://www.suse.com/security/cve/CVE-2026-23239"
},
{
"category": "external",
"summary": "SUSE Bug 1259485 for CVE-2026-23239",
"url": "https://bugzilla.suse.com/1259485"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23239"
},
{
"cve": "CVE-2026-23240",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23240"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Fix race condition in tls_sw_cancel_work_tx()\n\nThis issue was discovered during a code audit.\n\nAfter cancel_delayed_work_sync() is called from tls_sk_proto_close(),\ntx_work_handler() can still be scheduled from paths such as the\nDelayed ACK handler or ksoftirqd.\nAs a result, the tx_work_handler() worker may dereference a freed\nTLS object.\n\nThe following is a simple race scenario:\n\n cpu0 cpu1\n\ntls_sk_proto_close()\n tls_sw_cancel_work_tx()\n tls_write_space()\n tls_sw_write_space()\n if (!test_and_set_bit(BIT_TX_SCHEDULED, \u0026tx_ctx-\u003etx_bitmask))\n set_bit(BIT_TX_SCHEDULED, \u0026ctx-\u003etx_bitmask);\n cancel_delayed_work_sync(\u0026ctx-\u003etx_work.work);\n schedule_delayed_work(\u0026tx_ctx-\u003etx_work.work, 0);\n\nTo prevent this race condition, cancel_delayed_work_sync() is\nreplaced with disable_delayed_work_sync().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23240",
"url": "https://www.suse.com/security/cve/CVE-2026-23240"
},
{
"category": "external",
"summary": "SUSE Bug 1259484 for CVE-2026-23240",
"url": "https://bugzilla.suse.com/1259484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23240"
}
]
}
RHSA-2026:6053
Vulnerability from csaf_redhat - Published: 2026-03-30 10:03 - Updated: 2026-03-30 17:25A flaw was found in the Linux kernel's `qla2xxx` block SCSI generic (bsg) interface. This vulnerability, a double free, occurs because certain vendor-specific handlers incorrectly call the `bsg_job_done` function on both successful and failed operation paths. A local user could exploit this to trigger memory corruption, leading to a kernel crash and a Denial of Service (DoS). There is also a theoretical risk of local privilege escalation due to the memory corruption.
A flaw was found in the Linux kernel. A local attacker with CAP_NET_ADMIN capabilities, or remote packet traffic, could exploit a use-after-free vulnerability in the nf_tables_addchain() function's error handling. Successful exploitation could lead to a kernel crash, resulting in a Denial of Service (DoS), or potentially privilege escalation.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain() (CVE-2026-23231)\n\n* kernel: Linux kernel (qla2xxx): Double free vulnerability leads to denial of service and potential privilege escalation. (CVE-2025-71238)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:6053",
"url": "https://access.redhat.com/errata/RHSA-2026:6053"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2444376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2444376"
},
{
"category": "external",
"summary": "2444398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2444398"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_6053.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2026-03-30T17:25:19+00:00",
"generator": {
"date": "2026-03-30T17:25:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:6053",
"initial_release_date": "2026-03-30T10:03:59+00:00",
"revision_history": [
{
"date": "2026-03-30T10:03:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-30T10:03:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-30T17:25:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Real Time (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-devel@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-devel-matched@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-devel@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-devel-matched@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "perf-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "perf-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rtla@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rv-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "rv-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "rv-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rv@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-debuginfo@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debuginfo@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-64k-debug-debuginfo@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-64k-debuginfo@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libperf-debuginfo@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-64k@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-64k-core@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-64k-debug@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-64k-debug-core@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-64k-debug-devel@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-64k-debug-modules@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-64k-debug-modules-core@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-64k-debug-modules-extra@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-64k-devel@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-64k-modules@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-64k-modules-core@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-64k-modules-extra@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-core@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-core@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-core@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-core@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-modules@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-modules-core@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-debug-modules-extra@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-modules@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-modules-core@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-64k-modules-extra@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-core@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-core@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra-matched@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-uki-virt@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-uki-virt-addons@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"product": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"product_id": "libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libperf@6.12.0-124.47.1.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rtla@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rv@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libperf-debuginfo@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-core@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-core@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra-matched@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"product": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_id": "libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libperf@6.12.0-124.47.1.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "perf-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "perf-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rtla@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rv-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "rv-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "rv-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rv@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libperf-debuginfo@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-core@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-core@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-core@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-uki-virt@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-core@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra-matched@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-uki-virt@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-uki-virt-addons@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"product": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"product_id": "libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libperf@6.12.0-124.47.1.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel-matched@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel-matched@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel-matched@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "perf-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "perf-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rtla-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "rtla-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rtla@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rv-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "rv-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "rv-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rv@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libperf-debuginfo@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-core@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-core@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra-matched@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-core@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libperf-0:6.12.0-124.47.1.el10_1.s390x",
"product": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.s390x",
"product_id": "libperf-0:6.12.0-124.47.1.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libperf@6.12.0-124.47.1.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"product": {
"name": "kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"product_id": "kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@6.12.0-124.47.1.el10_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"product": {
"name": "kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"product_id": "kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@6.12.0-124.47.1.el10_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:6.12.0-124.47.1.el10_1.src",
"product": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.src",
"product_id": "kernel-0:6.12.0-124.47.1.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@6.12.0-124.47.1.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch"
},
"product_reference": "kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:6.12.0-124.47.1.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch"
},
"product_reference": "kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "libperf-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "perf-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "perf-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "perf-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "rtla-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rv-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "rv-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rv-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rv-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "rv-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rv-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "rv-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.src",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch"
},
"product_reference": "kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:6.12.0-124.47.1.el10_1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch"
},
"product_reference": "kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "libperf-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "perf-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "perf-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "perf-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "rtla-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rv-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "rv-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rv-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rv-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "rv-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rv-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "rv-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.src",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch"
},
"product_reference": "kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:6.12.0-124.47.1.el10_1.noarch as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch"
},
"product_reference": "kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "libperf-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "perf-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "perf-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "perf-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "rtla-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rv-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "rv-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rv-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rv-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "rv-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rv-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "rv-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "CRB-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.src as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.src",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch"
},
"product_reference": "kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:6.12.0-124.47.1.el10_1.noarch as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch"
},
"product_reference": "kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "libperf-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "perf-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "perf-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "perf-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "rtla-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rv-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "rv-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rv-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rv-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "rv-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rv-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time for NFV (v. 10)",
"product_id": "NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "rv-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "NFV-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.src as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.src",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch"
},
"product_reference": "kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:6.12.0-124.47.1.el10_1.noarch as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch"
},
"product_reference": "kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "libperf-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "perf-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "perf-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "perf-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "rtla-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rtla-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rv-0:6.12.0-124.47.1.el10_1.aarch64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64"
},
"product_reference": "rv-0:6.12.0-124.47.1.el10_1.aarch64",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rv-0:6.12.0-124.47.1.el10_1.ppc64le as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le"
},
"product_reference": "rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rv-0:6.12.0-124.47.1.el10_1.s390x as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x"
},
"product_reference": "rv-0:6.12.0-124.47.1.el10_1.s390x",
"relates_to_product_reference": "RT-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rv-0:6.12.0-124.47.1.el10_1.x86_64 as a component of Red Hat Enterprise Linux Real Time (v. 10)",
"product_id": "RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64"
},
"product_reference": "rv-0:6.12.0-124.47.1.el10_1.x86_64",
"relates_to_product_reference": "RT-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-71238",
"cwe": {
"id": "CWE-672",
"name": "Operation on a Resource after Expiration or Release"
},
"discovery_date": "2026-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2444398"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s `qla2xxx` block SCSI generic (bsg) interface. This vulnerability, a double free, occurs because certain vendor-specific handlers incorrectly call the `bsg_job_done` function on both successful and failed operation paths. A local user could exploit this to trigger memory corruption, leading to a kernel crash and a Denial of Service (DoS). There is also a theoretical risk of local privilege escalation due to the memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Linux kernel (qla2xxx): Double free vulnerability leads to denial of service and potential privilege escalation.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A kernel double free can be triggered in the qla2xxx bsg interface because some vendor specific handlers called bsg_job_done on both success and failure paths. This can result in the same bsg job being completed and freed twice which leads to memory corruption and a kernel crash. The issue is not network reachable. Impact is denial of service and there is a theoretical risk of local privilege escalation because the flaw is a kernel memory corruption condition.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-71238"
},
{
"category": "external",
"summary": "RHBZ#2444398",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2444398"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-71238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71238"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-71238",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-71238"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2026030437-CVE-2025-71238-76bc@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2026030437-CVE-2025-71238-76bc@gregkh/T"
}
],
"release_date": "2026-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-30T10:03:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6053"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module qla2xxx from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Linux kernel (qla2xxx): Double free vulnerability leads to denial of service and potential privilege escalation."
},
{
"cve": "CVE-2026-23231",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2026-03-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2444376"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A local attacker with CAP_NET_ADMIN capabilities, or remote packet traffic, could exploit a use-after-free vulnerability in the nf_tables_addchain() function\u0027s error handling. Successful exploitation could lead to a kernel crash, resulting in a Denial of Service (DoS), or potentially privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A use after free can occur in nf_tables_addchain error handling because a new chain is published to table chains via RCU before hook registration completes and is then freed without an RCU grace period when hook registration fails. This creates a race with RCU readers in the control plane such as nf_tables_dump_chains and also with in flight packet evaluation when an IPv4 hook is transiently installed for NFPROTO_INET and later IPv6 hook registration fails. For the CVSS the PR is L because a local actor with CAP_NET_ADMIN can induce the failing add chain path while remote packet traffic may hit the transient hook and trigger the UAF window. Impact ranges from a kernel crash to potential privilege escalation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-23231"
},
{
"category": "external",
"summary": "RHBZ#2444376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2444376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-23231",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23231"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-23231",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23231"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2026030436-CVE-2026-23231-1a96@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2026030436-CVE-2026-23231-1a96@gregkh/T"
}
],
"release_date": "2026-03-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-30T10:03:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2026:6053"
},
{
"category": "workaround",
"details": "In order to trigger the issue, it requires the ability to create user/net namespaces.\n\nOn non-containerized deployments of Red Hat Enterprise Linux 8, it is recommended to disable user namespaces by setting user.max_user_namespaces to 0:\n\n# echo \"user.max_user_namespaces=0\" \u003e /etc/sysctl.d/userns.conf\n# sysctl -p /etc/sysctl.d/userns.conf\n\nOn containerized deployments, such as Red Hat OpenShift Container Platform, do not use this mitigation as the functionality is needed to be enabled.",
"product_ids": [
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"AppStream-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"AppStream-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"BaseOS-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"BaseOS-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"CRB-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"CRB-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"NFV-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"NFV-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.src",
"RT-10.1.Z:kernel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-abi-stablelists-0:6.12.0-124.47.1.el10_1.noarch",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debug-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-debuginfo-common-aarch64-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-debuginfo-common-ppc64le-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-debuginfo-common-s390x-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-debuginfo-common-x86_64-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-devel-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-doc-0:6.12.0-124.47.1.el10_1.noarch",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-modules-extra-matched-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-64k-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-64k-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debug-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-core-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-rt-modules-extra-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-tools-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-tools-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-libs-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:kernel-tools-libs-devel-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-uki-virt-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:kernel-uki-virt-addons-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:kernel-zfcpdump-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-devel-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-devel-matched-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-core-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:kernel-zfcpdump-modules-extra-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:libperf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:perf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:python3-perf-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:python3-perf-debuginfo-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:rtla-0:6.12.0-124.47.1.el10_1.x86_64",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.aarch64",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.ppc64le",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.s390x",
"RT-10.1.Z:rv-0:6.12.0-124.47.1.el10_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: kernel: Privilege escalation or denial of service via use-after-free in nf_tables_addchain()"
}
]
}
FKIE_CVE-2025-71238
Vulnerability from fkie_nvd - Published: 2026-03-04 15:16 - Updated: 2026-03-17 21:21| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/057a5bdc481e58ab853117254867ffb22caf9f6e | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/27ac9679c43a09e54e2d9aae9980ada045b428e0 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/31f33b856d2324d86bcaef295f4d210477a1c018 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/708003e1bc857dd014d4c44278d7d77c26f91b1c | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/74e7458537cd9349cf019862e51491f670871707 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/871f6236da96c4a9712b8a29d7f555f767a47e95 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/c2c68225b1456f4d0d393b5a8778d51bb0d5b1d0 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/f2bbb4db0e4a4fbd5e649c0b5d8733f61da24720 | Patch |
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "05D10329-0F31-4D9E-ADDC-2675BCEEABBC",
"versionEndExcluding": "5.10.251",
"versionStartIncluding": "5.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "600A89ED-86F2-48D8-BB7C-5EE7A8832FC5",
"versionEndExcluding": "5.15.201",
"versionStartIncluding": "5.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6892F74B-3F14-4500-9652-24A2ECB04144",
"versionEndExcluding": "6.1.164",
"versionStartIncluding": "5.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4A9F36A3-A685-48A0-84B4-6217052BD058",
"versionEndExcluding": "6.6.127",
"versionStartIncluding": "6.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C2968F55-D03F-42BE-A694-F0A37BC8CBE3",
"versionEndExcluding": "6.12.74",
"versionStartIncluding": "6.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6BDEF9FB-423E-49F6-991B-9277CC3AF400",
"versionEndExcluding": "6.18.13",
"versionStartIncluding": "6.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7853A337-FB2A-4E19-AB47-4E38343532AA",
"versionEndExcluding": "6.19.3",
"versionStartIncluding": "6.19",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix bsg_done() causing double free\n\nKernel panic observed on system,\n\n[5353358.825191] BUG: unable to handle page fault for address: ff5f5e897b024000\n[5353358.825194] #PF: supervisor write access in kernel mode\n[5353358.825195] #PF: error_code(0x0002) - not-present page\n[5353358.825196] PGD 100006067 P4D 0\n[5353358.825198] Oops: 0002 [#1] PREEMPT SMP NOPTI\n[5353358.825200] CPU: 5 PID: 2132085 Comm: qlafwupdate.sub Kdump: loaded Tainted: G W L ------- --- 5.14.0-503.34.1.el9_5.x86_64 #1\n[5353358.825203] Hardware name: HPE ProLiant DL360 Gen11/ProLiant DL360 Gen11, BIOS 2.44 01/17/2025\n[5353358.825204] RIP: 0010:memcpy_erms+0x6/0x10\n[5353358.825211] RSP: 0018:ff591da8f4f6b710 EFLAGS: 00010246\n[5353358.825212] RAX: ff5f5e897b024000 RBX: 0000000000007090 RCX: 0000000000001000\n[5353358.825213] RDX: 0000000000001000 RSI: ff591da8f4fed090 RDI: ff5f5e897b024000\n[5353358.825214] RBP: 0000000000010000 R08: ff5f5e897b024000 R09: 0000000000000000\n[5353358.825215] R10: ff46cf8c40517000 R11: 0000000000000001 R12: 0000000000008090\n[5353358.825216] R13: ff591da8f4f6b720 R14: 0000000000001000 R15: 0000000000000000\n[5353358.825218] FS: 00007f1e88d47740(0000) GS:ff46cf935f940000(0000) knlGS:0000000000000000\n[5353358.825219] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[5353358.825220] CR2: ff5f5e897b024000 CR3: 0000000231532004 CR4: 0000000000771ef0\n[5353358.825221] PKRU: 55555554\n[5353358.825222] Call Trace:\n[5353358.825223] \u003cTASK\u003e\n[5353358.825224] ? show_trace_log_lvl+0x1c4/0x2df\n[5353358.825229] ? show_trace_log_lvl+0x1c4/0x2df\n[5353358.825232] ? sg_copy_buffer+0xc8/0x110\n[5353358.825236] ? __die_body.cold+0x8/0xd\n[5353358.825238] ? page_fault_oops+0x134/0x170\n[5353358.825242] ? kernelmode_fixup_or_oops+0x84/0x110\n[5353358.825244] ? exc_page_fault+0xa8/0x150\n[5353358.825247] ? asm_exc_page_fault+0x22/0x30\n[5353358.825252] ? memcpy_erms+0x6/0x10\n[5353358.825253] sg_copy_buffer+0xc8/0x110\n[5353358.825259] qla2x00_process_vendor_specific+0x652/0x1320 [qla2xxx]\n[5353358.825317] qla24xx_bsg_request+0x1b2/0x2d0 [qla2xxx]\n\nMost routines in qla_bsg.c call bsg_done() only for success cases.\nHowever a few invoke it for failure case as well leading to a double\nfree. Validate before calling bsg_done()."
},
{
"lang": "es",
"value": "En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\n\nscsi: qla2xxx: Soluci\u00f3n para bsg_done() que causa doble liberaci\u00f3n\n\nKernel panic observado en el sistema,\n\n[5353358.825191] BUG: unable a handle page fault para address: ff5f5e897b024000\n[5353358.825194] #PF: supervisor write access in kernel mode\n[5353358.825195] #PF: error_code(0x0002) - not-present page\n[5353358.825196] PGD 100006067 P4D 0\n[5353358.825198] Oops: 0002 [#1] PREEMPT SMP NOPTI\n[5353358.825200] CPU: 5 PID: 2132085 Comm: qlafwupdate.sub Kdump: loaded Tainted: G W L ------- --- 5.14.0-503.34.1.el9_5.x86_64 #1\n[5353358.825203] Hardware name: HPE ProLiant DL360 Gen11/ProLiant DL360 Gen11, BIOS 2.44 01/17/2025\n[5353358.825204] RIP: 0010:memcpy_erms+0x6/0x10\n[5353358.825211] RSP: 0018:ff591da8f4f6b710 EFLAGS: 00010246\n[5353358.825212] RAX: ff5f5e897b024000 RBX: 0000000000007090 RCX: 0000000000001000\n[5353358.825213] RDX: 0000000000001000 RSI: ff591da8f4fed090 RDI: ff5f5e897b024000\n[5353358.825214] RBP: 0000000000010000 R08: ff5f5e897b024000 R09: 0000000000000000\n[5353358.825215] R10: ff46cf8c40517000 R11: 0000000000000001 R12: 0000000000008090\n[5353358.825216] R13: ff591da8f4f6b720 R14: 0000000000001000 R15: 0000000000000000\n[5353358.825218] FS: 00007f1e88d47740(0000) GS:ff46cf935f940000(0000) knlGS:0000000000000000\n[5353358.825219] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[5353358.825220] CR2: ff5f5e897b024000 CR3: 0000000231532004 CR4: 0000000000771ef0\n[5353358.825221] PKRU: 55555554\n[5353358.825222] Call Trace:\n[5353358.825223] \n[5353358.825224] ? show_trace_log_lvl+0x1c4/0x2df\n[5353358.825229] ? show_trace_log_lvl+0x1c4/0x2df\n[5353358.825232] ? sg_copy_buffer+0xc8/0x110\n[5353358.825236] ? __die_body.cold+0x8/0xd\n[5353358.825238] ? page_fault_oops+0x134/0x170\n[5353358.825242] ? kernelmode_fixup_or_oops+0x84/0x110\n[5353358.825244] ? exc_page_fault+0xa8/0x150\n[5353358.825247] ? asm_exc_page_fault+0x22/0x30\n[5353358.825252] ? memcpy_erms+0x6/0x10\n[5353358.825253] sg_copy_buffer+0xc8/0x110\n[5353358.825259] qla2x00_process_vendor_specific+0x652/0x1320 [qla2xxx]\n[5353358.825317] qla24xx_bsg_request+0x1b2/0x2d0 [qla2xxx]\n\nLa mayor\u00eda de las rutinas en qla_bsg.c llaman a bsg_done() solo para casos de \u00e9xito. Sin embargo, algunas la invocan tambi\u00e9n para casos de fallo, lo que lleva a una doble liberaci\u00f3n. Validar antes de llamar a bsg_done()."
}
],
"id": "CVE-2025-71238",
"lastModified": "2026-03-17T21:21:58.760",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2026-03-04T15:16:12.700",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/057a5bdc481e58ab853117254867ffb22caf9f6e"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/27ac9679c43a09e54e2d9aae9980ada045b428e0"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/31f33b856d2324d86bcaef295f4d210477a1c018"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/708003e1bc857dd014d4c44278d7d77c26f91b1c"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/74e7458537cd9349cf019862e51491f670871707"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/871f6236da96c4a9712b8a29d7f555f767a47e95"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/c2c68225b1456f4d0d393b5a8778d51bb0d5b1d0"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/f2bbb4db0e4a4fbd5e649c0b5d8733f61da24720"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-415"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
MSRC_CVE-2025-71238
Vulnerability from csaf_microsoft - Published: 2026-03-02 00:00 - Updated: 2026-03-31 01:38| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-71238 scsi: qla2xxx: Fix bsg_done() causing double free - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2025-71238.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "scsi: qla2xxx: Fix bsg_done() causing double free",
"tracking": {
"current_release_date": "2026-03-31T01:38:12.000Z",
"generator": {
"date": "2026-03-31T07:11:03.691Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-71238",
"initial_release_date": "2026-03-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-03-05T01:04:46.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-03-19T01:02:10.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
},
{
"date": "2026-03-20T14:36:01.000Z",
"legacy_version": "3",
"number": "3",
"summary": "Information published."
},
{
"date": "2026-03-27T14:37:03.000Z",
"legacy_version": "4",
"number": "4",
"summary": "Information published."
},
{
"date": "2026-03-31T01:38:12.000Z",
"legacy_version": "5",
"number": "5",
"summary": "Information published."
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 kernel 6.6.126.1-1",
"product": {
"name": "\u003cazl3 kernel 6.6.126.1-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 kernel 6.6.126.1-1",
"product": {
"name": "azl3 kernel 6.6.126.1-1",
"product_id": "20956"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 kernel 5.15.200.1-1",
"product": {
"name": "\u003ccbl2 kernel 5.15.200.1-1",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cbl2 kernel 5.15.200.1-1",
"product": {
"name": "cbl2 kernel 5.15.200.1-1",
"product_id": "20925"
}
}
],
"category": "product_name",
"name": "kernel"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 kernel 6.6.126.1-1 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kernel 6.6.126.1-1 as a component of Azure Linux 3.0",
"product_id": "20956-17084"
},
"product_reference": "20956",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 kernel 5.15.200.1-1 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 kernel 5.15.200.1-1 as a component of CBL Mariner 2.0",
"product_id": "20925-17086"
},
"product_reference": "20925",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-71238",
"notes": [
{
"category": "general",
"text": "Linux",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"20956-17084",
"20925-17086"
],
"known_affected": [
"17084-1",
"17086-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-71238 scsi: qla2xxx: Fix bsg_done() causing double free - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2025-71238.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-05T01:04:46.000Z",
"details": "6.6.130.1-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2026-03-05T01:04:46.000Z",
"details": "5.15.202.1-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"title": "scsi: qla2xxx: Fix bsg_done() causing double free"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.